Chosen-message electromagnetic analysis against cryptographic software on embedded OS

Hajime Uno, Sho Endo, Yu Ich Hayashi, Naofumi Homma, Takafumi Aoki

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

This paper presents an EMA (electromagnetic analysis) against an RSA software on an embedded operating system (OS) and its counter measure First, we describe a pre processing step to find an appropriate observation point for EMA, where the EM radiation caused by cryptographic operations can be observed in an accurate manner. We employ a specific input pattern, which is suitable for observing EM radiation according to an EM radiation model, and scan a micro magnetic probe on the tar get device in order to find specific EM radiation pattern for EMA. This preprocessing can be conducted on another programmable device that has the same CPU and OS as the target device We demonstrate that such EM analysis is effective for an RSA software per formed on Android OS. We also confirm the validity of a counter measure against the presented attack.

Original languageEnglish
Title of host publicationEMC 2014/Tokyo - 2014 International Symposium on Electromagnetic CompatibiIity, Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages314-317
Number of pages4
ISBN (Electronic)9784885522871
Publication statusPublished - 2014 Dec 23
Event2014 International Symposium on Electromagnetic CompatibiIity, EMC 2014 - Tokyo, Japan
Duration: 2014 May 122014 May 16

Publication series

NameIEEE International Symposium on Electromagnetic Compatibility
Volume2014-December
ISSN (Print)1077-4076
ISSN (Electronic)2158-1118

Other

Other2014 International Symposium on Electromagnetic CompatibiIity, EMC 2014
CountryJapan
CityTokyo
Period14/5/1214/5/16

Keywords

  • RSA
  • chosen-message SEMA
  • electromagnetic analysis
  • side-channel attacks

ASJC Scopus subject areas

  • Condensed Matter Physics
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Chosen-message electromagnetic analysis against cryptographic software on embedded OS'. Together they form a unique fingerprint.

Cite this