• Complain

Maamar Ouladj - Side-Channel Analysis of Embedded Systems: An Efficient Algorithmic Approach

Here you can read online Maamar Ouladj - Side-Channel Analysis of Embedded Systems: An Efficient Algorithmic Approach full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Springer, genre: Children. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Maamar Ouladj Side-Channel Analysis of Embedded Systems: An Efficient Algorithmic Approach
  • Book:
    Side-Channel Analysis of Embedded Systems: An Efficient Algorithmic Approach
  • Author:
  • Publisher:
    Springer
  • Genre:
  • Year:
    2021
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Side-Channel Analysis of Embedded Systems: An Efficient Algorithmic Approach: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Side-Channel Analysis of Embedded Systems: An Efficient Algorithmic Approach" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they execute cryptographic algorithms, and they consist of two steps, measurement and analysis. This book tackles the analysis part, especially under situations where the targeted device is protected by random masking. The authors explain advances in the field and provide the reader with mathematical formalizations. They present all known analyses within the same notation framework, which allows the reader to rapidly understand and learn contrasting approaches. It will be useful as a graduate level introduction, also for self-study by researchers and professionals, and the examples are taken from real-world datasets.

Maamar Ouladj: author's other books


Who wrote Side-Channel Analysis of Embedded Systems: An Efficient Algorithmic Approach? Find out the surname, the name of the author of the book and a list of all author's works by series.

Side-Channel Analysis of Embedded Systems: An Efficient Algorithmic Approach — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Side-Channel Analysis of Embedded Systems: An Efficient Algorithmic Approach" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Book cover of Side-Channel Analysis of Embedded Systems Maamar Ouladj and - photo 1
Book cover of Side-Channel Analysis of Embedded Systems
Maamar Ouladj and Sylvain Guilley
Side-Channel Analysis of Embedded Systems
An Efficient Algorithmic Approach
1st ed. 2021
Logo of the publisher Maamar Ouladj Paris 8 University Paris France - photo 2
Logo of the publisher
Maamar Ouladj
Paris 8 University, Paris, France
Sylvain Guilley
Secure-IC, S.A.S., Paris, France
ISBN 978-3-030-77221-5 e-ISBN 978-3-030-77222-2
https://doi.org/10.1007/978-3-030-77222-2
The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG

The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

Contents
Part I Classical Side-Channel Attacks
Part II Spectral Approach in Side-Channel Attacks
Part III Coalescence-based Side-Channel Attacks
The Author(s), under exclusive license to Springer Nature Switzerland AG 2021
M. Ouladj, S. Guilley Side-Channel Analysis of Embedded Systems https://doi.org/10.1007/978-3-030-77222-2_1
1. General Introduction
Maamar Ouladj
(1)
Paris 8 University, Paris, France
(2)
Secure-IC, S.A.S., Paris, France
Maamar Ouladj
Email:

Todays digital era connects everyone and everything in between through the Internet of Things (IoTs). That situation leads to an omnipresence of embedded systems in our daily life endowed with integrated capability to run cryptographic protocols (consumer electronics, telecommunication and industrial appliances, governmental and military systems, etc.). Those need to manage authorized access, firmware integrity, life-cycle irreversible steps, and so on. Thus, the functional correctness of IoTs is an absolute prerequisite. Nevertheless, unless suitable care is given, cryptographic protocol implementations in both software and hardware happen to leak sensitive information during their execution. Side-Channel Attacks (SCA) is a scientific field whose purpose is the analysis of this leaked information, in order to recover the secret parameters of the protocols. In the seminal paper on Side-Channel Attacks (SCA), published by Kocher et al. [], or a contention for Central Processing Unit (CPU) resources such as cache memories.

In practice, small devices (such as smart cards) are common targets of SCA. But, also larger devices such as smartphones and computers can be attacked through their side-channel leakage [].

The SCA requires two steps, namely:
  1. side-channel emanation traces collection from the device;

  2. analysis of the traces, altogether referred to as the acquisition campaign, to extract the sensitive information.

The first step requires some acquisition skills, which is typically carried out by automated experimental benches, as, for instance, described in Chap. 3 of []. The second step is essentially agnostic with respect to the attacked device, in that it consists in distinguishing the correct secret key from several hypotheses.

As stated in the SCA literature, according to the adversary abilities (knowing or not the leakage model of the device, having or not a copy of this target device, ...), the optimal attack is either the Correlation Power Analysis (CPA) [].

This book addresses the following topics:
  • the correct implementation of the SCA distinguishers, and

  • their optimal algorithmic implementation in terms of speed.

Instead of carrying out an SCA straightforwardly on the raw traces, one can carry it out using the averaged leakage per message value []. In this book, we first generalize the use of the Walsh-Hadamard transform for any situation. Consequently, using both of the coalescence principle, the spectral approach, and others optimizations, we provide several improvements of the implementation complexity in both of CPA, LRA, and the Template attacks. All these improvements of the complexities are conflated and put in perspective in this book. They lead asymptotically to optimal SCA assaults, from a computational standpoint, even in presence of countermeasures.

The attacks will be illustrated throughout this book on the running example of the Advanced Encryption Standard (AES []).

Outline and Contributions

The present book is structured in three parts. The first part consists in the state of the art about known attacks. The second part contains the efficient processing of the prominent attacks put forward in the first part.

The beginning of the Part I provides a state of the art of Side-Channel Analyses (SCAs) through three chapters. Chapter consists in some foundations of side-channel attacks. Namely, a general framework of SCA is introduced, then different leakage models are given, and eventually different security metrics are defined. Also we introduce different techniques used for trace pre-processing, leakage-wise.

Chapter tackles the most important side-channel distinguishers. Namely, we introduce Simple Power Analysis (SPA), Differential Power Analysis (DPA), Correlation Power Analysis (CPA, either using Pearson or rank-based statistics), Covariance-Based Distinguisher, Collision Side-Channel Attacks, Mutual Information Analysis (MIA), Kolmogorov-Smirnov Distance (KS)-based distinguisher, Chi-squared Test (Chi-2-Test)-based distinguisher, Template Attack (TA), Linear Regression-based Side-Channel Attacks (LRA), Machine Learning Distinguishers, and the most recent Higher Order Optimal Distinguisher (HOOD).

In Chap. , we introduce the different countermeasures aiming at stymying SCA attacks, namely, the hiding (on the time/amplitude dimension) and the masking techniques. For the time dimensions hiding, we introduce both of the random insertion of dummy operations, the jittering, and the shuffling of operations. For the amplitude dimensions hiding, we introduce the two complementary techniques for reducing the Signal-to-Noise Ratio (SNR), namely, the noise increase and the signal reduction. For the masking countermeasure, we introduce different known masking schemes, namely, the Boolean Masking (BM), the Multiplicative Masking (MM), the Affine Masking (AfM), the Arithmetic Masking (ArM), the Polynomials-based Masking (PM), Leakage Squeezing Masking (LSM), the Rotating S-boxes Masking (RSM), the Inner Product Masking (IPM), and the most recent Direct Sum Masking (DSM) schemes. After that, we introduce an extension of the DSM to a so-called Multi-shares Direct Sum Masking (DSM).

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Side-Channel Analysis of Embedded Systems: An Efficient Algorithmic Approach»

Look at similar books to Side-Channel Analysis of Embedded Systems: An Efficient Algorithmic Approach. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Side-Channel Analysis of Embedded Systems: An Efficient Algorithmic Approach»

Discussion, reviews of the book Side-Channel Analysis of Embedded Systems: An Efficient Algorithmic Approach and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.