Applying Thermal Side-Channel Attacks on Asymmetric Cryptography

Journal Article (2021)
Author(s)

A.A.M. Aljuffri (TU Delft - Computer Engineering, King Abdulaziz City for Science and Technology, Riyadh)

Marc Zwalua (Student TU Delft)

Cezar Reinbrecht (TU Delft - Computer Engineering)

Said Hamdioui (TU Delft - Quantum & Computer Engineering)

M. Taouil (TU Delft - Computer Engineering)

Research Group
Computer Engineering
Copyright
© 2021 A.A.M. Aljuffri, Marc Zwalua, Cezar Reinbrecht, S. Hamdioui, M. Taouil
DOI related publication
https://doi.org/10.1109/TVLSI.2021.3111407
More Info
expand_more
Publication Year
2021
Language
English
Copyright
© 2021 A.A.M. Aljuffri, Marc Zwalua, Cezar Reinbrecht, S. Hamdioui, M. Taouil
Research Group
Computer Engineering
Issue number
11
Volume number
29
Pages (from-to)
1930 - 1942
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Side-channel attacks (SCAs) are powerful attacks that could be used to retrieve keys from electronic devices. Several physical leakage sources can be exploited in SCAs, such as power, time, heat, and so on. Heat is one of the side-channels that is not frequently analyzed by attackers in the literature due to the high noise associated with thermal traces. This article investigates the practicality of adapting power-based SCAs [i.e., correlation power analysis (CPA) and deep-learning-based power attacks (DL-based PA)] for thermal attacks and refer to them as correlation thermal attack (CTA) and DL-based thermal attack (DL-based TA). In addition, we introduce a new attack called progressive CTA (PCTA). We evaluate the different thermal SCAs against an unprotected and protected software implementation of Rivest-Shamir-Adleman (RSA). Our results show the practicality of the three attacks (i.e. CTA, DL-based TA, and PCTA) as a 100% key recovery is realized.

Files

License info not available