• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
CAD4Security

CAD4Security

CAD4Security

  • Home
  • Contests
  • Technical Events
  • Outreach
  • CAD Tools
  • SoC Vulnerability Database
  • Trainings
  • News
  • Special Calls
  • Sponsors
  • Call For Contributions

Chapter 9: EM-based Side Channel Analysis

You are here: Home / Trainings / Hardware Security Lab (HSL) / Chapter 9: EM-based Side Channel Analysis

Chapter 9

EM Side-Channel Attack on AES

In recent years, cryptographic circuits have become essential to the security of embedded systems. However, side-channel attacks, which reveal a secret key on the cryptographic circuit by measuring power consumption or electromagnetic radiation during cryptographic operations, are attracting attentions. The EM based side-channel attack is more threatening because it is a non-contact attack compared with power analysis attacks. In this chapter, we focus on correlation EM analysis (CEMA) attacks on Advanced Encryption Standard (AES) crypto hardware using EM probe. Specifically, this chapter provides a basic understanding of the attack design, measurement equipment, and capturing EM traces, followed by demonstrating how to extract secret keys from an AES block cipher using CEMA attacks on an FPGA.

download chapter files

CAD4Security

Navigation

EVENTS
CAD TOOLS
SPECIAL CALLS
CONTACT US




Copyright © 2022