International Journal of Computer
& Organization Trends

Research Article | Open Access | Download PDF

Volume 5 | Issue 6 | Year 2015 | Article Id. IJCOT-V27P303 | DOI : https://doi.org/10.14445/22492593/IJCOT-V27P303

Case Study on Various Countermeasures to Avoid Side Channel Attacks


P. G. V. Suresh Kumar

Citation :

P. G. V. Suresh Kumar, "Case Study on Various Countermeasures to Avoid Side Channel Attacks," International Journal of Computer & Organization Trends (IJCOT), vol. 5, no. 6, pp. 14-17, 2015. Crossref, https://doi.org/10.14445/22492593/IJCOT-V27P303

Abstract

Side Channel Attacks is relatively a new area in cryptography that has gained more and more interest in early nineties. The side channel attacks are implemented on the physical domain exploiting the characteristics of the physical objects used in the cryptography. These implementations attacks sometimes turn out to be much more efficient than the best known cryptanalytic attacks. This paper aims to give an introduction to various types of side channel attacks and provides various countermeasures to avoid them.

Keywords

Side Channel Attacks, Timing Attacks, Fault attacks.

References

[1] Elisabeth Oswald Bart Preneel “A Survey on Passive Side-Channel Attacks and their Countermeasures for the NESSIE Public-Key Cryptosystems”.
[2] Jem Berkes, University of Waterloo „Hardware Attacks on Cryptographic Devices & Implementation Attacks on Embedded Systems and Other Portable Hardware”.
[3] Chester Rebeiro, Mainack Mondal, and Debdeep Mukhopadhyay “Pinpointing Cache Timing Attacks on AES”, Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, India.
[4] Francios-Xavier Standaert, “Introduction to Side channel attacks” , UCL Crypto Group, Place du Levant 3, B-1348 Louvain-la-Neuve, Belgium.
[5] Hagai Bar-El ,”Intoduction to side channel attacks”, White paper.
[6] YoungBin Zhou, DengGuo Feng ,“Side- Channel Attacks: Ten Years After Its Publication And the Impacts on Cryptographic Module Security Testing” The work of this paper is funded by the National Natural Science Foundation of P.R. China under the Grant No. 60503014 & No. 60273027 & No. 60373039.