Differential Side Channel Analysis: Simple Side Channel Analysis

653 Words3 Pages
Simple Side Channel Analysis: At first makes use of characteristics that are directly visible in one measurement trace. In addition the secret key needs to have some simple, exploitable relationship with the operations that are visible in the measurement trace. Finally typically, vulnerable implementations include key dependent branching. Differential Side Channel Analysis: It looks for side channel differences that are not directly visible in one measurement trace. The statistical methods have to be applied. In addition is targeting one specific intermediate result that shows up shows up in a specific pat of the measurement traces. Moreover a typical approach chooses a selection function, an intermediate result at the beginning or end of the cryptographic algorithm. The result of the selection function depends on the known input/output data and a small number of hypothesis on the key value. Furthermore the outcome of the selection function leads to a partitioning of the overall measurement data for each hypothesis used. Finally for the correct key hypothesis, different statistical properties of the two partitioning sets are expected at the points in time witch depend on the result of the selection function. Possible Side Channels attacks are with: power, time, faults, electro-magnetic radiations, sound, scan chains. d) For any RSA public/private key triple, (e, d, n), the key mathematical fact is that the encryption and decryption functions are inverses of one another. That is, if f(m)=me mod n is the encryption function (which is public) and g(m)=me d mod n is the decryption function (which is private), then, f(g(m))= m and g(f(m))=m The idea behind a digital signature using RSA is that f is a function that is known to every... ... middle of paper ... ...rly in the 90s. Eventually, it increased its speed and added more functionality like General Packet Radio System (GPRS) to the system which enhanced it to 2.5G status. 2.5G has data rates up to about 144kbit/s. It typically uses a variation of Time Division Multiple Access (TDMA). UMTS is the third generation (3G) of mobile telecommunications technology. Currently, it can offer transfer speeds of about 3.6 Mbits per second and even more, which can make data transfer seamless and downloads relatively fast. Unlike GSM, UMTS is mainly based on CDMA (Code Division Multiple Access) scheme and now combines it with TDMA. The four biggest differences are: 1. UMTS has faster data transfer rates than GSM. 2. GSM is 2G and 2.5G while UMTS is already 3G. 3. GSM is a rather old technology while UMTS is newer. 4. GSM is typically based on TDMA while UMTS is mainly CDMA-based.
Open Document