{"id":3998,"date":"2023-01-07T19:02:17","date_gmt":"2023-01-07T19:02:17","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=3998"},"modified":"2023-07-10T14:22:04","modified_gmt":"2023-07-10T14:22:04","slug":"ch9_em_sca","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch9_em_sca\/","title":{"rendered":"Chapter 9: EM-based Side Channel Analysis"},"content":{"rendered":"\n<h2 class=\"is-style-subheading wp-block-heading\"><strong>Chapter 9<\/strong><\/h2>\n\n\n\n<h2 class=\"is-style-subheading wp-block-heading\" style=\"font-style:normal;font-weight:100\">EM Side-Channel Attack on AES<\/h2>\n\n\n\n<p>In recent years, cryptographic circuits have become essential to the security of embedded systems. However, side-channel attacks, which reveal a secret key on the cryptographic circuit by measuring power consumption or electromagnetic radiation during cryptographic operations, are attracting attentions. The EM based side-channel attack is more threatening because it is a non-contact attack compared with power analysis attacks. In this chapter, we focus on correlation EM analysis (CEMA) attacks on Advanced Encryption Standard (AES) crypto hardware using EM probe. Specifically, this chapter provides a basic understanding of the attack design, measurement equipment, and capturing EM traces, followed by demonstrating how to extract secret keys from an AES block cipher using CEMA attacks on an FPGA.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link button\" href=\"http:\/\/cad4security.org\/wp-content\/uploads\/Chapter09_EMbasedSCA.zip\">download chapter files<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Chapter 9 EM Side-Channel Attack on AES In recent years, cryptographic circuits have become essential to the security of embedded systems. However, side-channel attacks, which reveal a secret key on the cryptographic circuit by measuring power consumption or electromagnetic radiation during cryptographic operations, are attracting attentions. The EM based side-channel attack is more threatening because &hellip;<\/p>\n","protected":false},"author":6,"featured_media":2565,"parent":3964,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3998"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=3998"}],"version-history":[{"count":4,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3998\/revisions"}],"predecessor-version":[{"id":4622,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3998\/revisions\/4622"}],"up":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3964"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media\/2565"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=3998"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}