1 / 12

Side Channel Attacks

Side Channel Attacks. Presented by: Vishwanath Patil Abhay Jalisatgi. Overview. Introduction What are Side Channel Attacks? Types of Side Channel Attacks Prevention Summary . Introduction.

abrial
Download Presentation

Side Channel Attacks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Side Channel Attacks Presented by: Vishwanath Patil Abhay Jalisatgi

  2. Overview • Introduction • What are Side Channel Attacks? • Types of Side Channel Attacks • Prevention • Summary

  3. Introduction • Cryptographic algorithms are usually found to be resistant against most intrusive type of attacks theoretically. • The practical application of these algorithms pave way for several different types of attacks. • One of them is SIDE CHANNEL ATTACK.

  4. What are Side Channel Attacks? • Attacks originating from information gained from the physical implementation of a cryptosystem.

  5. Types of Side Channel Attacks • Timing Attacks • Based on measuring the amount of time various computations take to perform. • Timing measurements are fed to a statistical model that provides guessed bit key with a certain level of accuracy. • The number of samples required to retrieve the information depends on signal properties and noise.

  6. Types of Side Channel Attacks • Power Analysis Attacks • Based on varying power consumption by the hardware during computation. • Further categorized into • Simple Power Analysis(SPA) • Differential Power Analysis(DPA)

  7. Types of Side Channel Attacks • Simple Power Analysis(SPA) Attacks • Involves direct interpretation of power consumption measurements collected during cryptographic operations. • SPA can reveal the sequence of microprocessor instructions executed. • Sonic spectrum measured using an ultrasonic microphone.

  8. Types of Side Channel Attacks • Differential Power Analysis • Involves statistical analysis of power consumption measurements from a cryptosystem. • Have signal processing & error correction properties.

  9. Types of Side Channel Attacks • Differential Fault Analysis • Rely on extracting keys by generating faults in a cryptographic system. • Based on encrypting the same piece of data twice and comparing the results.

  10. Prevention • General countermeasures: • Data Independent Calculations • Binding • Licensing Modified Algorithms • Countermeasures against timing attacks: • Adding Delays • Time Equalization of Multiplication & Squaring

  11. Prevention • Countermeasures against power analysis attacks • Power Consumption Balancing • Reduction of Signal Size • Addition of Noise • Shielding • Modification of Algorithm Design • Countermeasures against fault attacks • Running the encryption twice

  12. Summary • Using Side Channel information, it becomes easy to gain secret information from a device. • Protecting against these can be a challenge, is costly and must be done with utmost care. • Side Channel countermeasures find application mostly in high-security areas such as in banking industry, online payment applications.

More Related