A pre-processing composition for secret key recovery on Android smartphone

16Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Simple Side-Channel Analyses (SSCA) are known as techniques to uncover a cryptographic secret from one single spied waveform. Up to now, these very powerful attacks have been illustrated on simple devices which leakage was obvious. On more advanced targets, such as high-end processors of smartphones, a simple visual analysis of the waveforms might not be sufficient to read the secret at once. In this paper, we detail and explain how a composition of time-frequency pre-processings manages to extract the relevant information from one signal capture of an asymmetric cryptographic operation (RSA and ECC) running on an Android system. The lesson is that side-channel countermeasures must be applied even on advanced platforms such as smartphones to prevent secret information theft through the electromagnetic (EM) waveforms. © 2014 IFIP International Federation for Information Processing.

Cite

CITATION STYLE

APA

Nakano, Y., Souissi, Y., Nguyen, R., Sauvage, L., Danger, J. L., Guilley, S., … Miyake, Y. (2014). A pre-processing composition for secret key recovery on Android smartphone. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8501 LNCS, pp. 76–91). Springer Verlag. https://doi.org/10.1007/978-3-662-43826-8_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free