Abstract
By analyzing the scanned data in cryptography circuit, scan-based side-channel attacks retrieve a secret key, which are considerable as a threat into cryptosystem LSI and therefore they are not permitted and we have to restrict them. In scan-based side-channel attacks which retrieve secret keys during a cryptography, one will have to register the data simply by employing a scan path, which suggest that one can retrieve a secret key in a cryptography LSI. This can be a scan-based side-channel attack. RSA is one of the most necessary cryptography algorithms and as a result it effectively realizes a public-key cryptography system. However, typical scan-based side-channel attacks cannot be applied to it because of its complicated algorithm structure. Paper proposes a scan-based side-channel attack that permits us to retrieve a secret key in an RSA circuit. The proposed planned technique is based on identifying intermediate values calculated in an RSA circuit. We tend to specialize in a one-bit time sequence that is restricted to some intermediate values. By examining the one-bit time sequence in the scan path, we can find out the register position specific to the intermediate value and, can recognize whether the intermediate value is calculated in the target RSA circuit or not.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Agrawal, M., Karmakar, S., Saha, D., & Mukhopadhyay, D. (2008). Scand based side channel attacks on stream ciphers and their countermeasures. Progress in Cryptology-INDOCRYPT, 2008, 226–238.
Da Rolt, J., Das, A., Ghosh, S., Di Natale, G., Flotes, M. L., Rouzeyre, B., & Verbauwhede, I. (2012). Scan attacks on side channel and fault attack resistant public key implementations. Journal of Cryptographic Engineering (JCEN), 2(4), 207–219.
Ege, B., Das, A., Batina, L., Verbauwhede, I. (2013). Security of countermeasures against state-of-the-art differential scan attacks. In Workshop on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE), Co-located with IEEE European Test Symposium (ETS), 2013.
Fan, J., Verbauwhede, I. (2012). An updated survey on secure ecc implementations: Attacks, countermeasures and cost. In Cryptography and security (Vol. 6805, pp. 265–282), Lecture Notes in Computer Science. Springer.
Menezes, A., van Oorschot, P., Vanstone, S. (1997). Handbook of applied cryptography. CRC Press.
Wikipedia, the free encyclopedia. Retrieved from https://en.wikipedia.org.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Dalvadi, D., Kothari, B., Shah, K. (2016). A New Differential Scan-Based Side-Channel Attacks Against RSA Cryptosystem. In: Satapathy, S., Joshi, A., Modi, N., Pathak, N. (eds) Proceedings of International Conference on ICT for Sustainable Development. Advances in Intelligent Systems and Computing, vol 409. Springer, Singapore. https://doi.org/10.1007/978-981-10-0135-2_12
Download citation
DOI: https://doi.org/10.1007/978-981-10-0135-2_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0133-8
Online ISBN: 978-981-10-0135-2
eBook Packages: EngineeringEngineering (R0)