Abstract
Side-channel analysis has become a widely recognized threat to the security of cryptographic implementations. Different side-channel attacks, as well as countermeasures, have been proposed in the literature. Such attacks pose a severe threat to both hardware and software cryptographic implementations, especially in the IoT environment where the attacker may easily gain physical access to a device, leaving it vulnerable to tampering. In this paper, we provide a comprehensive survey regarding the non-invasive passive side-channel analysis. We describe both non-profiled and profiled attacks, related security metrics, countermeasures against such attacks, and leakage-assessment methodologies, as available in the literature of more than twenty years of research.
Funder
Czech Technical University in Prague
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference146 articles.
1. Security, privacy and trust in Internet of Things: The road ahead
2. The block cipher Rijndael;Daemen;Proceedings of the International Conference on Smart Card Research and Advanced Applications,1998
3. A method for obtaining digital signatures and public-key cryptosystems
4. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems;Kocher;Proceedings of the Annual International Cryptology Conference,1996
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献