Efficient mapping of EM radiation associated with information leakage for cryptographic devices

This paper presents an efficient map generation technique for evaluating the intensity of electromagnetic (EM) radiation associated with information leakage for cryptographic devices at the PCB level. First, we investigate the relation between the intensity of the overall EM radiation and the intensity of EM information leakage on a cryptographic device. For this purpose, we prepare a map of the magnetic field on the device by using an EM scanning system, after which we perform correlation electromagnetic analysis (CEMA) at all measurement points on the device, including points above the cryptographic module. The examined device is a standard evaluation board for cryptographic modules (SASEBO), where a cryptographic circuit is implemented on one of the FPGAs on the board. With this experiment, we demonstrate that an efficient map of EM radiation associated with information leakage can be generated on the basis of an EM radiation map. We also confirm that the generated map is in fair agreement with the corresponding map obtained from exhaustive CEMA.

[1]  Hidenori Sekiguchi,et al.  MEASUREMENT OF RADIATED COMPUTER RGB SIGNALS , 2009 .

[2]  Takeshi Sugawara,et al.  Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules , 2009, WISA.

[3]  Lionel Torres,et al.  Magnitude squared incoherence EM analysis for integrated cryptographic module localisation , 2009 .

[4]  Martin Feldhofer,et al.  On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices , 2009, WISA.

[5]  Yongdae Kim,et al.  Biasing power traces to improve correlation in power analysis attacks , 2010 .

[6]  Ingrid Verbauwhede,et al.  A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.

[7]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[8]  T. Mizuki,et al.  Suppression of information leakage from electronic devices based on SNR , 2011, 2011 IEEE International Symposium on Electromagnetic Compatibility.

[9]  Dakshi Agrawal,et al.  The EM Side-Channel(s) , 2002, CHES.

[10]  Sylvain Guilley,et al.  Electromagnetic Radiations of FPGAs: High Spatial Resolution Cartography and Attack on a Cryptographic Module , 2009, TRETS.

[11]  C. Paul Introduction to Electromagnetic Compatibility (Wiley Series in Microwave and Optical Engineering) , 2006 .

[12]  Denis Réal,et al.  Enhancing correlation electromagnetic attack using planar near-field cartography , 2009, 2009 Design, Automation & Test in Europe Conference & Exhibition.

[13]  ChangKyun Kim,et al.  Differential Side Channel Analysis Attacks on FPGA Implementations of ARIA , 2007 .

[14]  N. Homma,et al.  Identification of information leakage spots on a cryptographic device with an RSA processor , 2011, 2011 IEEE International Symposium on Electromagnetic Compatibility.

[15]  Markus G. Kuhn Security Limits for Compromising Emanations , 2005, CHES.

[16]  Stefan Mangard,et al.  Power analysis attacks - revealing the secrets of smart cards , 2007 .

[17]  Francis Olivier,et al.  Electromagnetic Analysis: Concrete Results , 2001, CHES.

[18]  Christophe Clavier,et al.  Correlation Power Analysis with a Leakage Model , 2004, CHES.