DocumentCode
134955
Title
Side channel attacks and their mitigation techniques
Author
Khan, Ajoy Kumar ; Mahanta, Hridoy Jyoti
Author_Institution
Dept. of Inf. Technol., Assam Univ., Silchar, India
fYear
2014
fDate
1-2 Feb. 2014
Firstpage
1
Lastpage
4
Abstract
Side channel cryptanalysis is one of the most volatile fields of research in security prospects. It has proved that cryptanalysis is no more confined to its dependence on plain text or cipher text. Indeed side channel attack uses the physical characteristics of the cryptographic device to find the cryptographic algorithm used and also the secret key. It is one of the most efficient techniques and has successfully broken almost all the cryptographic algorithms today. In this paper we aim to present a review on the various side channel attacks possible. Also, the techniques proposed to mitigate such an attack have been stated.
Keywords
cryptography; cryptographic device; ivolatile field; mitigation technique; security prospect; side channel attack; side channel cryptanalysis; Ciphers; Elliptic curve cryptography; Encryption; Hardware; Timing; AES; DES; DPA; Power Analysis; SPA; cryptographic devic;
fLanguage
English
Publisher
ieee
Conference_Titel
Automation, Control, Energy and Systems (ACES), 2014 First International Conference on
Conference_Location
Hooghy
Print_ISBN
978-1-4799-3893-3
Type
conf
DOI
10.1109/ACES.2014.6807983
Filename
6807983
Link To Document