Fuzzy analysis of side channel information

Ehsan Saeedi, Yinan Kong

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

3 Citations (Scopus)

Abstract

Cryptographic algorithms implemented inside embedded systems have been designed to guarantee the security of data transition, but these electronic devices can be vulnerable to different class of attacks, mostly side channel attacks. Over the last decade, many attacks have been done successfully on different cryptographic algorithms, but these attacks mostly benefit from different ideal assumption and laboratory conditions. In this paper we propose a novel approach of side channel information analysis, based on fuzzy logic, that can efficiently conjecture the secret bits of a cryptosystem especially in realtime condition in which inputs are usually imprecise, noisy or missing. The validation and effictiveness of the proposed fuzzy approach is shown through a case study and accuracy comparison between electromagnetic, power and fuzzy analysis methods. Our experimental results confirmed that the fuzzy analysis produce comparable results, respectively better in the presence of noise.

Original languageEnglish
Title of host publication2014, 8th International Conference on Signal Processing and Communication Systems, ICSPCS 2014 - Proceedings
EditorsTadeusz A. Wysocki, Beata J. Wysocki
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages1-5
Number of pages5
ISBN (Electronic)9781479952557
DOIs
Publication statusPublished - 23 Jan 2014
Event8th International Conference on Signal Processing and Communication Systems, ICSPCS 2014 - Gold Coast, Australia
Duration: 15 Dec 201417 Dec 2014

Other

Other8th International Conference on Signal Processing and Communication Systems, ICSPCS 2014
Country/TerritoryAustralia
CityGold Coast
Period15/12/1417/12/14

Fingerprint

Dive into the research topics of 'Fuzzy analysis of side channel information'. Together they form a unique fingerprint.

Cite this