RSA Algoritmasinin Raspberry Pi Üzerinde Gerçeklemesine Elektromanyetik Yayinim Analizi

Translated title of the contribution: Electromagnetic radiation analysis of implementation of RSA algorithm on a Raspberry Pi

Ersin Hatun, Elif Buyukkaya, Siddika Berna Ors Yalcin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)

Abstract

In this paper, security analysis of RSA implementation on a Raspberry Pi against electromagnetic radiation analysis is evaluated. Two different RSA algorithm is implemented on Raspberry Pi. Simple Electromagnetic Analysis and Differential Electromagnetic Analysis attacks are performed. Using Simple Electromagnetic Analysis attack on an unprotected implementation, all key bits are found with one measurement. Also, Differential Electromagnetic Analysis attack is performed against an improved implemantation that has countermeasure against Simple Electromagnetic Analysis attack. One key bit is found using 2500 measurements with a correlation analysis in Differential Electromagnetic Analysis attack.

Translated title of the contributionElectromagnetic radiation analysis of implementation of RSA algorithm on a Raspberry Pi
Original languageTurkish
Title of host publication26th IEEE Signal Processing and Communications Applications Conference, SIU 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-4
Number of pages4
ISBN (Electronic)9781538615010
DOIs
Publication statusPublished - 5 Jul 2018
Event26th IEEE Signal Processing and Communications Applications Conference, SIU 2018 - Izmir, Turkey
Duration: 2 May 20185 May 2018

Publication series

Name26th IEEE Signal Processing and Communications Applications Conference, SIU 2018

Conference

Conference26th IEEE Signal Processing and Communications Applications Conference, SIU 2018
Country/TerritoryTurkey
CityIzmir
Period2/05/185/05/18

Bibliographical note

Publisher Copyright:
© 2018 IEEE.

Fingerprint

Dive into the research topics of 'Electromagnetic radiation analysis of implementation of RSA algorithm on a Raspberry Pi'. Together they form a unique fingerprint.

Cite this