Analysis of Electromagnetic Information Leakage Based on Cryptographic Integrated Circuits

Cryptographic algorithm is the most commonly used method of information security protection for many devices. The secret key of cryptographic algorithm is usually stored in these devices’ registers. In this paper, we propose an electromagnetic information leakage model to investigate the relationshi...

Full description

Saved in:
Bibliographic Details
Published inEntropy (Basel, Switzerland) Vol. 23; no. 11; p. 1508
Main Authors Sun, Shaofei, Zhang, Hongxin, Cui, Xiaotong, Li, Qiang, Dong, Liang, Fang, Xing
Format Journal Article
LanguageEnglish
Published Basel MDPI AG 13.11.2021
MDPI
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Cryptographic algorithm is the most commonly used method of information security protection for many devices. The secret key of cryptographic algorithm is usually stored in these devices’ registers. In this paper, we propose an electromagnetic information leakage model to investigate the relationship between the electromagnetic leakage signal and the secret key. The registers are considered as electric dipole models to illustrate the source of the electromagnetic leakage. The equivalent circuit of the magnetic field probe is developed to bridge the output voltage and the electromagnetic leakage signal. Combining them, the electromagnetic information leakage model’s function relationship can be established. Besides, an electromagnetic leakage model based on multiple linear regression is proposed to recover the secret key and the model’s effectiveness is evaluated by guess entropy. Near field tests are conducted in an unshielded ordinary indoor environment to investigate the electromagnetic side-channel information leakage. The experiment result shows the correctness of the proposed electromagnetic leakage model and it can be used to recover the secret key of the cryptographic algorithm.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ISSN:1099-4300
1099-4300
DOI:10.3390/e23111508