Title :
The Re-emission Side Channel
Author :
Burnside, Andrew ; Erdogan, Ahmet ; Arslan, Tughrul
Author_Institution :
Inst. for Syst. Level Integration, Livingston
Abstract :
Conventional side-channel attacks which exploit the dynamic power consumption of CMOS devices to extract secret information from cryptographic devices are well established. The presence of an additional side channel utilising scattered electromagnetic emissions has previously been suggested, though a practical demonstration of the effect on cryptographic hardware has not been published. This paper presents an experimental validation of the presence of a re-emission side channel, which exploits the modulated scattering due to the illumination of an integrated circuit by an external RF carrier. Data dependent re-emission behaviour is shown on both a discrete logic inverter chain and a smartcard microcontroller. The re-emission side channel is not detectable using standard smartcard anti-tampering detectors.
Keywords :
CMOS integrated circuits; cryptography; microcontrollers; smart cards; CMOS devices; cryptographic devices; data dependent re-emission; discrete logic inverter chain; re-emission side channel; scattered electromagnetic emissions; smartcard antitampering detectors; smartcard microcontroller; Cryptography; Data mining; Electromagnetic scattering; Energy consumption; Hardware; Lighting; Microcontrollers; Pulse inverters; Radio frequency; Radiofrequency integrated circuits; cryptography; electromagnetic compatibility; integrated circuits; side channel attacks;
Conference_Titel :
Bio-inspired Learning and Intelligent Systems for Security, 2008. BLISS '08. ECSIS Symposium on
Conference_Location :
Edinburgh
Print_ISBN :
978-0-7695-3265-3
DOI :
10.1109/BLISS.2008.22