Abstract
Side-channel attacks on cryptographic algorithms targets the implementation of the algorithm. Information can leak from the implementation in several different ways and, in this paper, electromagnetic radiation from an FPGA is considered. We examine to which extent key information from an AES implementation can be deduced using a low-end oscil-loscope. Moreover, we examine how the antenna’s distance from the FPGA affects the results in this setting. Our experiments show that some key bits in-deed can be inferred from the measurements, despite having a far from optimal setting.
Author supplied keywords
Cite
CITATION STYLE
Westman, O., & Hell, M. (2020). Electromagnetic side-channel attack on aes using low-end equipment. ECTI Transactions on Computer and Information Technology, 14(2), 139–148. https://doi.org/10.37936/ecti-cit.2020142.239925
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.