Simple Side-Channel Analyses (SSCA) are known as techniques to uncover a cryptographic secret from one single spied waveform. Up to now, these very powerful attacks have been illustrated on simple devices which leakage was obvious. On more advanced targets, such as high-end processors of smartphones, a simple visual analysis of the waveforms might not be sufficient to read the secret at once. In this paper, we detail and explain how a composition of time-frequency pre-processings manages to extract the relevant information from one signal capture of an asymmetric cryptographic operation (RSA and ECC) running on an Android system. The lesson is that side-channel countermeasures must be applied even on advanced platforms such as smartphones to prevent secret information theft through the electromagnetic (EM) waveforms. © 2014 IFIP International Federation for Information Processing.
CITATION STYLE
Nakano, Y., Souissi, Y., Nguyen, R., Sauvage, L., Danger, J. L., Guilley, S., … Miyake, Y. (2014). A pre-processing composition for secret key recovery on Android smartphone. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8501 LNCS, pp. 76–91). Springer Verlag. https://doi.org/10.1007/978-3-662-43826-8_6
Mendeley helps you to discover research relevant for your work.