Electromagnetic analysis against public-key cryptographic software on embedded OS

Hajime Uno, Sho Endo, Naofumi Homma, Yu-Ichi Hayashi, Takafumi Aoki

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)


Electromagnetic analysis (EMA) against public-key cryptographic software on an embedded OS is presented in this paper. First, we propose a method for finding an observation point for EMA, where the EM radiation caused by cryptographic operations can be observed with low noise. The basic idea is to find specific EM radiation patterns produced by cryptographic operations given specific input pattern. During the operations, we scan the surface of the target device(s) with a micro magnetic probe. The scan is optimized in advanced using another compatible device that has the same central processing unit (CPU) and OS as the target device. We demonstrate the validity of the proposed EMAs through some EMA experiments with two types of RSA software on an embedded OS platform. The two types of RSA software have different implementations for modular multiplication algorithms: one is a typical and ready-made implementation using BigInteger class on Java standard library, and another is a custom-made implementation based on the Montgomery multiplication algorithm. We conduct experiments of chosen-message EMA using our scanning method, and show such EMAs successfully reveal the secret key of RSA software even under the noisy condition of the embedded OS platform. We also discuss some countermeasures against the above EMAs.

Original languageEnglish
Pages (from-to)1242-1249
Number of pages8
JournalIEICE Transactions on Communications
Issue number7
Publication statusPublished - 2015 Jul 1


  • Chosen-message simple electromagnetic analysis
  • EM information security, side-channel attack
  • Electromagnetic analysis
  • Embedded OS
  • RSA software

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications
  • Electrical and Electronic Engineering


Dive into the research topics of 'Electromagnetic analysis against public-key cryptographic software on embedded OS'. Together they form a unique fingerprint.

Cite this