Practical results of em cartography on a FPGA-based RSA hardware implementation

Laurent Sauvage, Sylvain Guilley, Jean Luc Danger, Naofumi Homma, Yu Ichi Hayashi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Side channel attack is a powerful technique to extracting secret key from cryptographic applications of embedded systems. Best results are obtained by placing a small electromagnetic probe just over areas of an integrated circuit which are leaking the most information. To find such locations, some cartography methods have been proposed in the past, but never used against asymmetric-key cryptosystems. In this paper, we target such cryptosystem, more precisely a FPGA-based RSA hardware implementation. We show that these methods are effective to locate the RSA cryptoprocessor.

Original languageEnglish
Title of host publicationEMC 2011 - Proceedings
Subtitle of host publication2011 IEEE International Symposium on Electromagnetic Compatibility
Pages768-772
Number of pages5
DOIs
Publication statusPublished - 24 Oct 2011
Externally publishedYes
Event2011 IEEE International Symposium on Electromagnetic Compatibility, EMC 2011 - Long Beach, CA, United States
Duration: 14 Aug 201119 Aug 2011

Publication series

NameIEEE International Symposium on Electromagnetic Compatibility
ISSN (Print)1077-4076

Conference

Conference2011 IEEE International Symposium on Electromagnetic Compatibility, EMC 2011
Country/TerritoryUnited States
CityLong Beach, CA
Period14/08/1119/08/11

Fingerprint

Dive into the research topics of 'Practical results of em cartography on a FPGA-based RSA hardware implementation'. Together they form a unique fingerprint.

Cite this