Electromagnetic side-channel attack on aes using low-end equipment

4Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.

Abstract

Side-channel attacks on cryptographic algorithms targets the implementation of the algorithm. Information can leak from the implementation in several different ways and, in this paper, electromagnetic radiation from an FPGA is considered. We examine to which extent key information from an AES implementation can be deduced using a low-end oscil-loscope. Moreover, we examine how the antenna’s distance from the FPGA affects the results in this setting. Our experiments show that some key bits in-deed can be inferred from the measurements, despite having a far from optimal setting.

Cite

CITATION STYLE

APA

Westman, O., & Hell, M. (2020). Electromagnetic side-channel attack on aes using low-end equipment. ECTI Transactions on Computer and Information Technology, 14(2), 139–148. https://doi.org/10.37936/ecti-cit.2020142.239925

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free