Multi-Bytes electromagnetic analysis: a novel method to get the key
Conventional correlation electromagnetic analysis (CEMA) usually exploits electromagnetic power consumption of single byte. The leakage model only chooses single byte as the attacking target, while regarding the other bytes as noise. This means that conventional leakage model has abandoned most of t...
Saved in:
Published in | 2019 IEEE 6th International Symposium on Electromagnetic Compatibility (ISEMC) pp. 1 - 3 |
---|---|
Main Authors | , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.11.2019
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Conventional correlation electromagnetic analysis (CEMA) usually exploits electromagnetic power consumption of single byte. The leakage model only chooses single byte as the attacking target, while regarding the other bytes as noise. This means that conventional leakage model has abandoned most of the information that can be available. In order to take full advantage of information, we proposed a more effective method against AES-128 by using multi-bytes to extract the key. From the result of our experiment performed on Sakura-G, fewer traces were required by multi-bytes CEMA than single byte analysis to recover the entire key correctly. |
---|---|
DOI: | 10.1109/ISEMC48616.2019.9142590 |