检测功率篡改帮助安全的物联网设备
许多物联网设备(物联网)将需要传输数据安全,要求使用加密算法和安全密钥存储。其中一些密钥将被用于访问重要的服务,有可能,可用于网络犯罪分子在网络上发动攻击或获得财务优势。例如,一个米,报告使用的资源,如能源可以被篡改,以减少法案。
因此,非常重要的是,任何安全密钥的有效保护,使他们不能被检索和误用。不幸的是,有技术,使它成为可能的未受保护的系统受到损害。
电子电路产生的各种排放量的副产品,他们的处理,使攻击者有可能没有详细了解电路的实际结构,以推断它正在处理什么数据。热和电磁辐射是攻击者的信息的可行来源。由于这些排放量的副作用的操作,使用它们来执行逆向工程赢得了术语“侧信道分析”。

All attacks take advantage of the changes in processing behavior that will be exhibited at different times during algorithm execution. There are two broad classes of side-channel analysis: simple and differential. Within those classes, attackers can use a range of side-channel properties, such as the heat generated, power consumed, or execution time. For example, naïve algorithms may return early from comparisons, indicating to the attacker which bytes within a password are wrong.
Software implementations of cryptographic algorithms may also demonstrate timing variations that depend on the state of bits within a key because operations can vary in complexity depending on the key value. Another issue with software code is that on-chip caches can affect timing in ways that allow an attacker to obtain information about the data being processed.
声明:本文内容及配图由入驻作者撰写或者入驻合作网站授权转载。文章观点仅代表作者本人,不代表电子发烧友网立场。文章及其配图仅供工程师学习之用,如有内容侵权或者其他违规问题,请联系本站处理。 举报投诉
全部0条评论
快来发表一下你的评论吧 !