Simple Electromagnetic Analysis in Cryptography

In this paper, the authors describe the main principle and methods of simple electromagnetic analysis and thus provide an overview of simple electromagnetic analysis. The paper describe specific SPA attack used visual inspection of EM traces, template based attack and collision attack. After reading the paper, the reader is sufficiently informed of any context of SEMA. This paper is the practical realization of SEMA which is focused on AES implementation. The visual inspection of EM trace of AES is performed step by step and the result is the determination of secret key hamming weight.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Resource Details

Provided by:
The International Journal of Advances in Telecommunications, Electrotechnics, Signals and Systems
Topic:
Security
Format:
PDF