【24h】

Security Evaluation Against Electromagnetic Analysis at Design Time

机译:设计时针对电磁分析的安全性评估

获取原文
获取原文并翻译 | 示例

摘要

Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power analysis (DPA) becoming an important side channel cryptanalysis attack on many cryptographic implementations, so that constitutes a real threat to smart card security. A systematic simulation methodology is proposed to identify and assess electromagnetic (EM) leakage characteristics of secure processors at design time. This EM simulation methodology involves current flow simulation, chip layout parasitics extraction, then data processing to simulate direct EM emissions or modulated emissions. Tests implemented on synchronous and asynchronous processors indicates that the synchronous processor has data dependent EM emission, while the asynchronous processor has data dependent timing which is visible in differential EM analysis (DEMA). In particular, DEMA of amplitude demodulated emissions reveals greater leakage compared to DEMA of direct emissions and DPA. The proposed simulation methodology can be easily employed in the framework of an integrated circuit (IC) design flow to perform a systematic EM characteristics analysis.
机译:电磁分析(EMA)可用于通过分析设备发出的电场和/或磁场来破坏机密信息。随之而来的是差分功率分析(DPA)成为对许多密码实施方案的重要侧通道密码分析攻击,从而对智能卡安全性构成了真正的威胁。提出了一种系统仿真方法,以在设计时识别和评估安全处理器的电磁(EM)泄漏特征。这种电磁仿真方法包括电流仿真,芯片布局寄生物提取,然后进行数据处理以模拟直接电磁辐射或调制辐射。在同步和异步处理器上执行的测试表明,同步处理器具有与数据相关的EM发射,而异步处理器具有与数据相关的时序,这在差分EM分析(DEMA)中可见。尤其是,与直接辐射和DPA相比,振幅解调辐射的DEMA显示出更大的泄漏。所提出的仿真方法可以很容易地在集成电路(IC)设计流程的框架中采用,以执行系统的EM特性分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号