Physical authentication using side-channel information

Authentication based on cryptographic protocols is a key technology for recent security systems. This paper proposes a new authentication method that utilizes the side channel that already exists in many authentication systems. Side-channel analysis has been studied intensively from the attacker vie...

Full description

Saved in:
Bibliographic Details
Published in2016 4th International Conference on Information and Communication Technology (ICoICT) pp. 1 - 6
Main Authors Sakiyama, Kazuo, Kasuya, Momoka, Machida, Takanori, Matsubara, Arisa, Kuai, Yunfeng, Hayashi, Yu-ichi, Mizuki, Takaaki, Miura, Noriyuki, Nagata, Makoto
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.05.2016
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Authentication based on cryptographic protocols is a key technology for recent security systems. This paper proposes a new authentication method that utilizes the side channel that already exists in many authentication systems. Side-channel analysis has been studied intensively from the attacker viewpoint and is best known for key-recovery attacks against cryptographic implementations using physical information. In this paper, reversing the traditional thought, we propose to use the key-dependent side-channel information constructively to enhance, or as an alternate to, existing cryptographic protocols. Using Advanced Encryption Standard (AES)-based authentication as an example, we demonstrate, based on experiments using an Field Programmable Gate Array (FPGA), that the side-channel information leaked from cryptographic devices is sufficiently unique for authentication.
DOI:10.1109/ICoICT.2016.7571953