1-2hit |
Yu-ichi HAYASHI Naofumi HOMMA Takaaki MIZUKI Takeshi SUGAWARA Yoshiki KAYANO Takafumi AOKI Shigeki MINEGISHI Akashi SATOH Hideaki SONE Hiroshi INOUE
This paper presents a possibility of Electromagnetic (EM) analysis against cryptographic modules outside their security boundaries. The mechanism behind the information leakage is explained from the view point of Electromagnetic Compatibility: electric fluctuation released from cryptographic modules can conduct to peripheral circuits based on ground bounce, resulting in radiation. We demonstrate the consequence of the mechanism through experiments where the ISO/IEC standard block cipher AES (Advanced Encryption Standard) is implemented on an FPGA board and EM radiations from power and communication cables are measured. Correlation Electromagnetic Analysis (CEMA) is conducted in order to evaluate the information leakage. The experimental results show that secret keys are revealed even though there are various disturbing factors such as voltage regulators and AC/DC converters between the target module and the measurement points. We also discuss information-suppression techniques as electrical-level countermeasures against such CEMAs.
Ken KAWAMATA Shigeki MINEGISHI Yoshinori TAKA Osamu FUJIWARA
The very fast transients of micro-gap discharges driven by low voltage electrostatic discharging (ESDs) are investigated in the time domain. We previously developed a 12 GHz wideband measurement setup consisting of a distributed constant line system, however the observed transients due to micro-gap discharges had very fast rise times of 34 ps or less, which reached the limitation on our system. In this paper, we proposed a method for estimating wideband transients beyond the measurement limit by using the transmission loss of a high performance coaxial transmission line. The proposed method is validated by estimating an impulsive voltage waveform with rise/fall time of 16 ps from the waveform measured through a semi-rigid coaxial cable with a length of 10 m.