<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta charset="utf-8">
<meta name="generator" content="pdf2htmlEX">
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
<link rel="stylesheet" href="https://static.pudn.com/base/css/base.min.css">
<link rel="stylesheet" href="https://static.pudn.com/base/css/fancy.min.css">
<link rel="stylesheet" href="https://static.pudn.com/prod/directory_preview_static/6257928560196e4b84b35cb8/raw.css">
<script src="https://static.pudn.com/base/js/compatibility.min.js"></script>
<script src="https://static.pudn.com/base/js/pdf2htmlEX.min.js"></script>
<script>
try{
pdf2htmlEX.defaultViewer = new pdf2htmlEX.Viewer({});
}catch(e){}
</script>
<title></title>
</head>
<body>
<div id="sidebar" style="display: none">
<div id="outline">
</div>
</div>
<div id="pf1" class="pf w0 h0" data-page-no="1"><div class="pc pc1 w0 h0"><img class="bi x0 y0 w1 h1" alt="" src="https://static.pudn.com/prod/directory_preview_static/6257928560196e4b84b35cb8/bg1.jpg"><div class="t m0 x1 h2 y1 ff1 fs0 fc0 sc0 ls0 ws0">Chapter<span class="_ _0"> </span>2</div><div class="t m0 x1 h3 y2 ff1 fs1 fc0 sc0 ls1 ws0">Intr<span class="_ _1"></span>oduction<span class="_"> </span>to<span class="_"> </span>Side-Channel<span class="_"> </span>Attacks</div><div class="t m0 x1 h4 y3 ff1 fs2 fc0 sc0 ls2 ws0">Franc<span class="_ _2"></span><span class="ls3">¸<span class="_ _3"></span>ois-Xa<span class="_ _1"></span>vier<span class="_"> </span>Standaert</span></div><div class="t m0 x1 h5 y4 ff1 fs3 fc0 sc0 ls4 ws0">2.1<span class="_ _4"> </span>Introduction</div><div class="t m0 x1 h6 y5 ff2 fs2 fc0 sc0 ls3 ws0">A<span class="_ _5"> </span>cryptographic<span class="_ _5"> </span>primitiv<span class="_ _1"></span>e<span class="_ _5"> </span>can<span class="_ _5"> </span>be<span class="_ _5"> </span>considered<span class="_ _5"> </span>from<span class="_ _5"> </span>two<span class="_ _5"> </span>points<span class="_ _5"> </span>of<span class="_ _5"> </span>vie<span class="_ _1"></span>w:<span class="_ _5"> </span>on<span class="_ _5"> </span>the<span class="_ _5"> </span>one</div><div class="t m0 x1 h6 y6 ff2 fs2 fc0 sc0 ls5 ws0">hand,<span class="_ _0"> </span>it<span class="_ _0"> </span>can<span class="_ _0"> </span>be<span class="_ _6"> </span>vie<span class="_ _1"></span>wed<span class="_ _0"> </span>as<span class="_ _6"> </span>an<span class="_ _0"> </span>abstract<span class="_ _0"> </span>mathematical<span class="_ _0"> </span>object<span class="_ _6"> </span>or<span class="_ _0"> </span>black<span class="_ _0"> </span>box<span class="_ _0"> </span>(i.e.,<span class="_ _6"> </span>a<span class="_ _0"> </span>trans-</div><div class="t m0 x1 h6 y7 ff2 fs2 fc0 sc0 ls3 ws0">formation,<span class="_ _7"> </span>possibly<span class="_ _7"> </span>parameterized<span class="_ _7"> </span>by<span class="_ _7"> </span>a<span class="_ _7"> </span>ke<span class="_ _1"></span>y<span class="_ _8"></span>,<span class="_ _7"> </span>turning<span class="_ _7"> </span>some<span class="_ _7"> </span>input<span class="_ _7"> </span>into<span class="_ _7"> </span>some<span class="_ _7"> </span>output);</div><div class="t m0 x1 h6 y8 ff2 fs2 fc0 sc0 ls3 ws0">on<span class="_ _7"> </span>the<span class="_ _5"> </span>other<span class="_ _7"> </span>hand,<span class="_ _5"> </span>this<span class="_ _7"> </span>primitive<span class="_ _7"> </span>will<span class="_ _7"> </span><span class="ff3 ls5">in<span class="_ _5"> </span>fine<span class="_ _7"> </span><span class="ff2">have<span class="_ _7"> </span>to<span class="_ _7"> </span>be<span class="_ _7"> </span>implemented<span class="_ _5"> </span>in<span class="_ _5"> </span>a<span class="_ _7"> </span>program</span></span></div><div class="t m0 x1 h6 y9 ff2 fs2 fc0 sc0 ls3 ws0">that<span class="_ _6"> </span>will<span class="_ _6"> </span>run<span class="_ _6"> </span>on<span class="_ _6"> </span>a<span class="_ _6"> </span>giv<span class="_ _1"></span>en<span class="_ _6"> </span>processor<span class="_ _1"></span>,<span class="_ _6"> </span>in<span class="_ _6"> </span>a<span class="_ _6"> </span>gi<span class="_ _1"></span>ven<span class="_ _6"> </span>en<span class="_ _8"></span>vironment,<span class="_ _6"> </span>and<span class="_ _6"> </span>will<span class="_ _6"> </span>therefore<span class="_ _0"> </span>present</div><div class="t m0 x1 h6 ya ff2 fs2 fc0 sc0 ls3 ws0">specific<span class="_ _5"> </span>characteristics.<span class="_ _5"> </span>The<span class="_ _5"> </span>first<span class="_ _5"> </span>point<span class="_ _5"> </span>of<span class="_ _5"> </span>view<span class="_ _7"> </span>is<span class="_ _5"> </span>the<span class="_ _5"> </span>one<span class="_ _5"> </span>of<span class="_ _9"> </span>“classical”<span class="_ _5"> </span>cryptanal-</div><div class="t m0 x1 h6 yb ff2 fs2 fc0 sc0 ls5 ws0">ysis;<span class="_ _a"> </span>the<span class="_ _a"> </span>second<span class="_ _a"> </span>one<span class="_ _a"> </span>is<span class="_ _a"> </span>the<span class="_ _a"> </span>one<span class="_ _a"> </span>of<span class="_ _a"> </span>physical<span class="_ _a"> </span>security<span class="_ _8"></span>.<span class="_ _a"> </span>Physical<span class="_ _a"> </span>attacks<span class="_ _a"> </span>on<span class="_ _a"> </span>crypto-</div><div class="t m0 x1 h6 yc ff2 fs2 fc0 sc0 ls5 ws0">graphic<span class="_ _6"> </span>de<span class="_ _1"></span>vices<span class="_ _6"> </span>take<span class="_ _b"> </span>adv<span class="_ _1"></span>antage<span class="_ _6"> </span>of<span class="_ _b"> </span>implementation-specific<span class="_ _6"> </span>characteristics<span class="_ _6"> </span>to<span class="_ _6"> </span>recov<span class="_ _1"></span>er</div><div class="t m0 x1 h6 yd ff2 fs2 fc0 sc0 ls5 ws0">the<span class="_ _a"> </span>secret<span class="_ _9"> </span>parameters<span class="_ _a"> </span>in<span class="_ _8"></span>volv<span class="_ _1"></span>ed<span class="_ _a"> </span>in<span class="_ _9"> </span>the<span class="_ _a"> </span>computation.<span class="_ _9"> </span>They<span class="_ _a"> </span>are<span class="_ _9"> </span>therefore<span class="_ _a"> </span>much<span class="_ _9"> </span>less</div><div class="t m0 x1 h6 ye ff2 fs2 fc0 sc0 ls5 ws0">general<span class="_ _5"> </span>–<span class="_ _5"> </span>since<span class="_ _5"> </span>specific<span class="_ _5"> </span>to<span class="_ _5"> </span>a<span class="_ _5"> </span>giv<span class="_ _1"></span>en<span class="_ _5"> </span>implementation<span class="_ _5"> </span>–<span class="_ _5"> </span>but<span class="_ _5"> </span>often<span class="_ _5"> </span>much<span class="_ _5"> </span>more<span class="_ _5"> </span>power<span class="_ _8"></span>-</div><div class="t m0 x1 h6 yf ff2 fs2 fc0 sc0 ls3 ws0">ful<span class="_ _7"> </span>than<span class="_ _7"> </span>classical<span class="_ _7"> </span>cryptanalysis<span class="_ _7"> </span>and<span class="_ _7"> </span>are<span class="_ _7"> </span>considered<span class="_ _7"> </span>very<span class="_ _0"> </span>seriously<span class="_ _7"> </span>by<span class="_ _7"> </span>cryptographic</div><div class="t m0 x1 h6 y10 ff2 fs2 fc0 sc0 ls5 ws0">de<span class="_ _1"></span>vices<span class="_ _0"> </span>manufacturers.</div><div class="t m0 x2 h6 y11 ff2 fs2 fc0 sc0 ls5 ws0">Such<span class="_ _a"> </span>physical<span class="_ _9"> </span>attacks<span class="_ _a"> </span>are<span class="_ _9"> </span>numerous<span class="_ _a"> </span>and<span class="_ _a"> </span>can<span class="_ _9"> </span>be<span class="_ _a"> </span>classified<span class="_ _9"> </span>in<span class="_ _a"> </span>many<span class="_ _9"> </span>ways.<span class="_ _a"> </span>The</div><div class="t m0 x1 h6 y12 ff2 fs2 fc0 sc0 ls3 ws0">literature<span class="_ _0"> </span>usually<span class="_ _0"> </span>sorts<span class="_ _0"> </span>them<span class="_ _0"> </span>among<span class="_ _0"> </span>two<span class="_ _0"> </span>orthogonal<span class="_ _0"> </span>axes:</div><div class="t m0 x1 h6 y13 ff2 fs2 fc0 sc0 ls6 ws0">1.<span class="_ _c"> </span>In<span class="_ _8"></span>vasi<span class="_ _1"></span>ve<span class="_ _5"> </span><span class="ff3 ls4">vs.<span class="_ _9"> </span></span><span class="ls5">non-in<span class="_ _1"></span>v<span class="_ _1"></span>asi<span class="_ _1"></span>ve:<span class="_ _5"> </span>In<span class="_ _1"></span>v<span class="_ _1"></span>asiv<span class="_ _1"></span>e<span class="_ _5"> </span>attacks<span class="_ _9"> </span>require<span class="_ _9"> </span>depackaging<span class="_ _9"> </span>the<span class="_ _9"> </span>chip<span class="_ _5"> </span>to<span class="_ _9"> </span>get</span></div><div class="t m0 x3 h6 y14 ff2 fs2 fc0 sc0 ls5 ws0">direct<span class="_ _6"> </span>access<span class="_ _6"> </span>to<span class="_ _6"> </span>its<span class="_ _6"> </span>inside<span class="_ _6"> </span>components;<span class="_ _6"> </span>a<span class="_ _6"> </span>typical<span class="_ _0"> </span>example<span class="_ _b"> </span>of<span class="_ _6"> </span>this<span class="_ _6"> </span>is<span class="_ _6"> </span>the<span class="_ _6"> </span>connection</div><div class="t m0 x3 h6 y15 ff2 fs2 fc0 sc0 ls3 ws0">of<span class="_ _a"> </span>a<span class="_ _a"> </span>wire<span class="_ _a"> </span>on<span class="_ _a"> </span>a<span class="_ _a"> </span>data<span class="_ _a"> </span>b<span class="_ _1"></span>us<span class="_ _a"> </span>to<span class="_ _a"> </span>see<span class="_ _a"> </span>the<span class="_ _a"> </span>data<span class="_ _a"> </span>transfers.<span class="_ _a"> </span>A<span class="_ _a"> </span>non-in<span class="_ _8"></span>vasi<span class="_ _1"></span>ve<span class="_ _a"> </span>attack<span class="_ _a"> </span>only</div><div class="t m0 x3 h6 y16 ff2 fs2 fc0 sc0 ls3 ws0">exploits<span class="_ _a"> </span>externally<span class="_ _a"> </span>av<span class="_ _8"></span>ailable<span class="_ _d"> </span>information<span class="_ _a"> </span>(the<span class="_ _d"> </span>emission<span class="_ _a"> </span>of<span class="_ _d"> </span>which<span class="_ _a"> </span>is,<span class="_ _a"> </span>howe<span class="_ _1"></span>ver<span class="_ _8"></span>,</div><div class="t m0 x3 h6 y17 ff2 fs2 fc0 sc0 ls5 ws0">often<span class="_ _0"> </span>unintentional)<span class="_ _0"> </span>such<span class="_ _0"> </span>as<span class="_ _0"> </span>running<span class="_ _0"> </span>time,<span class="_ _0"> </span>power<span class="_ _6"> </span>consumption.</div><div class="t m0 x1 h6 y18 ff2 fs2 fc0 sc0 ls5 ws0">2.<span class="_ _c"> </span>Activ<span class="_ _8"></span>e<span class="_ _9"> </span><span class="ff3 ls4">vs.<span class="_ _9"> </span></span><span class="ls3">passiv<span class="_ _1"></span>e:<span class="_ _5"> </span>Activ<span class="_ _1"></span>e<span class="_ _5"> </span>attacks<span class="_ _9"> </span>try<span class="_ _5"> </span>to<span class="_ _9"> </span>tamper<span class="_ _5"> </span>with<span class="_ _9"> </span>the<span class="_ _9"> </span>devices’<span class="_ _7"> </span>proper<span class="_ _9"> </span>func-</span></div><div class="t m0 x3 h6 y19 ff2 fs2 fc0 sc0 ls3 ws0">tioning,<span class="_ _0"> </span>for<span class="_ _6"> </span>example,<span class="_ _0"> </span>fault-induction<span class="_ _6"> </span>attacks<span class="_ _0"> </span>will<span class="_ _0"> </span>try<span class="_ _0"> </span>to<span class="_ _0"> </span>induce<span class="_ _0"> </span>errors<span class="_ _6"> </span>in<span class="_ _0"> </span>the<span class="_ _0"> </span>com-</div><div class="t m0 x3 h6 y1a ff2 fs2 fc0 sc0 ls5 ws0">putation.<span class="_ _7"> </span>As<span class="_ _5"> </span>opposed,<span class="_ _7"> </span>passive<span class="_ _7"> </span>attacks<span class="_ _7"> </span>will<span class="_ _5"> </span>simply<span class="_ _7"> </span>observe<span class="_ _7"> </span>the<span class="_ _5"> </span>devices<span class="_ _7"> </span>behavior</div><div class="t m0 x3 h6 y1b ff2 fs2 fc0 sc0 ls3 ws0">during<span class="_ _0"> </span>their<span class="_ _0"> </span>processing,<span class="_ _0"> </span>without<span class="_ _0"> </span>disturbing<span class="_ _0"> </span>it.</div><div class="t m0 x1 h7 y1c ff2 fs4 fc0 sc0 ls7 ws0">F<span class="_ _8"></span>.-X.<span class="_ _b"> </span>Standaert<span class="_ _6"> </span>(<span class="ff4 ls4">B<span class="ff2">)</span></span></div><div class="t m0 x1 h8 y1d ff2 fs4 fc0 sc0 ls8 ws0">UCL<span class="_ _b"> </span>Crypto<span class="_ _6"> </span>Group,<span class="_ _6"> </span>Place<span class="_ _6"> </span>du<span class="_ _6"> </span>Lev<span class="_ _1"></span>ant<span class="_ _b"> </span>3,<span class="_ _6"> </span>B-1348<span class="_ _6"> </span>Louvain-la-Neuve,<span class="_ _b"> </span>Belgium</div><div class="t m0 x1 h8 y1e ff2 fs4 fc0 sc0 ls4 ws0">e-mail:<span class="_ _b"> </span>fstandae@uclouvain.be</div><div class="t m0 x1 h8 y1f ff2 fs4 fc0 sc0 ls4 ws0">Postdoctoral<span class="_ _b"> </span>researcher<span class="_ _6"> </span>of<span class="_ _6"> </span>the<span class="_ _6"> </span>Belgian<span class="_ _6"> </span>Fund<span class="_ _6"> </span>for<span class="_ _6"> </span>Scientific<span class="_ _b"> </span>Research<span class="_ _6"> </span>(FNRS).</div><div class="t m0 x1 h8 y20 ff2 fs4 fc0 sc0 ls8 ws0">I.M.R.<span class="_ _6"> </span>V<span class="_ _e"></span>erbauwhede<span class="_ _6"> </span>(ed.),<span class="_ _b"> </span><span class="ff3 ls4">Secure<span class="_ _b"> </span>Integr<span class="_ _1"></span>ated<span class="_ _b"> </span>Circuits<span class="_ _b"> </span>and<span class="_ _6"> </span>Systems<span class="ff2">,</span></span></div><div class="t m0 x1 h8 y21 ff2 fs4 fc0 sc0 ls8 ws0">Integrated<span class="_ _b"> </span>Circuits<span class="_ _6"> </span>and<span class="_ _6"> </span>Systems,<span class="_ _6"> </span>DOI<span class="_ _b"> </span>10.1007/978-0-387-71829-3</div><div class="t m0 x4 h8 y22 ff2 fs4 fc0 sc0 ls9 ws0">2,</div><div class="t m0 x5 h9 y23 ff2 fs5 fc0 sc0 ls4 ws0">C</div><div class="t m0 x1 ha y24 ff5 fs6 fc0 sc0 ls4 ws0"></div><div class="t m0 x6 h8 y25 ff2 fs4 fc0 sc0 ls4 ws0">Springer<span class="_ _b"> </span>Science+Business<span class="_ _6"> </span>Media,<span class="_ _6"> </span>LLC<span class="_ _6"> </span>2010</div><div class="t m0 x7 h8 y26 ff2 fs4 fc0 sc0 ls9 ws0">27</div></div><div class="pi" data-data='{"ctm":[2.037103,0.000000,0.000000,2.037103,0.000000,0.000000]}'></div></div>
</body>
</html>
<div id="pf2" class="pf w0 h0" data-page-no="2"><div class="pc pc2 w0 h0"><img class="bi x0 y0 w1 h1" alt="" src="https://static.pudn.com/prod/directory_preview_static/6257928560196e4b84b35cb8/bg2.jpg"><div class="t m0 x1 h8 y27 ff2 fs4 fc0 sc0 ls9 ws0">28<span class="_ _f"> </span><span class="ls7">F<span class="_ _8"></span>.-X.<span class="_ _b"> </span>Standaert</span></div><div class="t m0 x2 h6 y28 ff2 fs2 fc0 sc0 ls5 ws0">The<span class="_ _d"> </span>side-channel<span class="_ _d"> </span>attacks<span class="_ _d"> </span>we<span class="_ _d"> </span>consider<span class="_ _d"> </span>in<span class="_ _d"> </span>this<span class="_ _d"> </span>chapter<span class="_ _10"> </span>are<span class="_ _d"> </span>a<span class="_ _d"> </span>class<span class="_ _d"> </span>of<span class="_ _d"> </span>physical</div><div class="t m0 x1 h6 y29 ff2 fs2 fc0 sc0 ls3 ws0">attacks<span class="_ _9"> </span>in<span class="_ _9"> </span>which<span class="_ _a"> </span>an<span class="_ _5"> </span>adversary<span class="_ _9"> </span>tries<span class="_ _9"> </span>to<span class="_ _9"> </span>exploit<span class="_ _9"> </span>physical<span class="_ _9"> </span>information<span class="_ _a"> </span>leakages<span class="_ _5"> </span>such</div><div class="t m0 x1 h6 y2a ff2 fs2 fc0 sc0 ls3 ws0">as<span class="_ _a"> </span>timing<span class="_ _9"> </span>information<span class="_ _a"> </span>[9],<span class="_ _a"> </span>po<span class="_ _8"></span>wer<span class="_ _a"> </span>consumption<span class="_ _a"> </span>[10],<span class="_ _9"> </span>or<span class="_ _a"> </span>electromagnetic<span class="_ _a"> </span>radiation</div><div class="t m0 x1 h6 y2b ff2 fs2 fc0 sc0 ls3 ws0">[1].<span class="_ _0"> </span>Since<span class="_ _0"> </span>they<span class="_ _6"> </span>are<span class="_ _0"> </span>non-in<span class="_ _1"></span>vasi<span class="_ _8"></span>ve,<span class="_ _0"> </span>passiv<span class="_ _8"></span>e<span class="_ _0"> </span>and<span class="_ _0"> </span>they<span class="_ _0"> </span>can<span class="_ _0"> </span>generally<span class="_ _0"> </span>be<span class="_ _0"> </span>performed<span class="_ _0"> </span>using</div><div class="t m0 x1 h6 y2c ff2 fs2 fc0 sc0 ls3 ws0">relativ<span class="_ _8"></span>ely<span class="_ _7"> </span>cheap<span class="_ _7"> </span>equipment,<span class="_ _7"> </span>they<span class="_ _0"> </span>pose<span class="_ _7"> </span>a<span class="_ _7"> </span>serious<span class="_ _0"> </span>threat<span class="_ _7"> </span>to<span class="_ _7"> </span>the<span class="_ _0"> </span>security<span class="_ _7"> </span>of<span class="_ _7"> </span>most<span class="_ _7"> </span>cryp-</div><div class="t m0 x1 h6 y2d ff2 fs2 fc0 sc0 ls5 ws0">tographic<span class="_ _7"> </span>hardware<span class="_ _7"> </span>devices.<span class="_ _7"> </span>Such<span class="_ _7"> </span>de<span class="_ _1"></span>vices<span class="_ _7"> </span>range<span class="_ _7"> </span>from<span class="_ _7"> </span>personal<span class="_ _7"> </span>computers<span class="_ _5"> </span>to<span class="_ _7"> </span>small</div><div class="t m0 x1 h6 y2e ff2 fs2 fc0 sc0 ls5 ws0">embedded<span class="_ _9"> </span>devices<span class="_ _5"> </span>such<span class="_ _9"> </span>as<span class="_ _9"> </span>smart<span class="_ _9"> </span>cards<span class="_ _9"> </span>and<span class="_ _9"> </span>RFIDs<span class="_ _9"> </span>(radio<span class="_ _9"> </span>frequency<span class="_ _5"> </span>identification</div><div class="t m0 x1 h6 y2f ff2 fs2 fc0 sc0 ls3 ws0">de<span class="_ _1"></span>vices).<span class="_ _5"> </span>Their<span class="_ _5"> </span>proliferation<span class="_ _5"> </span>in<span class="_ _5"> </span>a<span class="_ _5"> </span>continuously<span class="_ _5"> </span>larger<span class="_ _5"> </span>spectrum<span class="_ _5"> </span>of<span class="_ _5"> </span>applications<span class="_ _5"> </span>has</div><div class="t m0 x1 h6 y30 ff2 fs2 fc0 sc0 ls5 ws0">turned<span class="_ _6"> </span>the<span class="_ _6"> </span>physical<span class="_ _6"> </span>security<span class="_ _6"> </span>and<span class="_ _6"> </span>side-channel<span class="_ _0"> </span>issue<span class="_ _6"> </span>into<span class="_ _6"> </span>a<span class="_ _6"> </span>real,<span class="_ _6"> </span>practical<span class="_ _0"> </span>concern<span class="_ _6"> </span>that</div><div class="t m0 x1 h6 y31 ff2 fs2 fc0 sc0 ls5 ws0">we<span class="_ _0"> </span>aim<span class="_ _0"> </span>to<span class="_ _0"> </span>introduce<span class="_ _0"> </span>in<span class="_ _0"> </span>this<span class="_ _0"> </span>chapter<span class="_ _8"></span>.</div><div class="t m0 x2 h6 y32 ff2 fs2 fc0 sc0 ls3 ws0">For<span class="_ _9"> </span>this<span class="_ _a"> </span>purpose,<span class="_ _a"> </span>we<span class="_ _a"> </span>start<span class="_ _a"> </span>by<span class="_ _a"> </span>co<span class="_ _1"></span>vering<span class="_ _9"> </span>the<span class="_ _a"> </span>basics<span class="_ _a"> </span>of<span class="_ _a"> </span>side-channel<span class="_ _a"> </span>attacks.<span class="_ _a"> </span>W<span class="_ _e"></span>e</div><div class="t m0 x1 h6 y33 ff2 fs2 fc0 sc0 ls5 ws0">discuss<span class="_ _a"> </span>the<span class="_ _a"> </span>origin<span class="_ _a"> </span>of<span class="_ _a"> </span>unintended<span class="_ _a"> </span>leakages<span class="_ _a"> </span>in<span class="_ _a"> </span>recent<span class="_ _a"> </span>microelectronic<span class="_ _a"> </span>technologies</div><div class="t m0 x1 h6 y34 ff2 fs2 fc0 sc0 ls5 ws0">and<span class="_ _9"> </span>describe<span class="_ _9"> </span>how<span class="_ _5"> </span>simple<span class="_ _9"> </span>measurement<span class="_ _a"> </span>setups<span class="_ _5"> </span>can<span class="_ _9"> </span>be<span class="_ _9"> </span>used<span class="_ _a"> </span>to<span class="_ _5"> </span>recover<span class="_ _5"> </span>and<span class="_ _9"> </span>exploit</div><div class="t m0 x1 h6 y35 ff2 fs2 fc0 sc0 ls3 ws0">these<span class="_ _9"> </span>physical<span class="_ _9"> </span>features.<span class="_ _a"> </span>Then,<span class="_ _5"> </span>we<span class="_ _a"> </span>introduce<span class="_ _5"> </span>some<span class="_ _9"> </span>classical<span class="_ _a"> </span>attacks:<span class="_ _5"> </span>simple<span class="_ _a"> </span>po<span class="_ _8"></span>wer</div><div class="t m0 x1 h6 y36 ff2 fs2 fc0 sc0 ls3 ws0">analysis<span class="_ _a"> </span>(SP<span class="_ _e"></span>A)<span class="_ _d"> </span>and<span class="_ _a"> </span>dif<span class="_ _1"></span>ferential<span class="_ _a"> </span>power<span class="_ _a"> </span>analysis<span class="_ _a"> </span>(DP<span class="_ _e"></span>A).<span class="_ _a"> </span>In<span class="_ _d"> </span>the<span class="_ _a"> </span>second<span class="_ _a"> </span>part<span class="_ _d"> </span>of<span class="_ _a"> </span>the</div><div class="t m0 x1 h6 y37 ff2 fs2 fc0 sc0 ls5 ws0">chapter<span class="_ _8"></span>,<span class="_ _7"> </span>we<span class="_ _0"> </span>put<span class="_ _7"> </span>forward<span class="_ _0"> </span>the<span class="_ _0"> </span>different<span class="_ _0"> </span>steps<span class="_ _7"> </span>of<span class="_ _0"> </span>an<span class="_ _0"> </span>actual<span class="_ _7"> </span>side-channel<span class="_ _0"> </span>attack<span class="_ _7"> </span>through</div><div class="t m0 x1 h6 y38 ff2 fs2 fc0 sc0 ls3 ws0">two<span class="_ _b"> </span>illustrati<span class="_ _1"></span>ve<span class="_ _b"> </span>examples.<span class="_ _b"> </span>W<span class="_ _e"></span>e<span class="_ _b"> </span>take<span class="_ _b"> </span>advantage<span class="_ _b"> </span>of<span class="_ _b"> </span>these<span class="_ _6"> </span>examples<span class="_ _b"> </span>to<span class="_ _b"> </span>stress<span class="_ _b"> </span>a<span class="_ _b"> </span>number<span class="_ _6"> </span>of</div><div class="t m0 x1 h6 y39 ff2 fs2 fc0 sc0 ls5 ws0">practical<span class="_ _6"> </span>concerns<span class="_ _6"> </span>regarding<span class="_ _b"> </span>the<span class="_ _0"> </span>implementation<span class="_ _6"> </span>of<span class="_ _6"> </span>side-channel<span class="_ _6"> </span>attacks<span class="_ _6"> </span>and<span class="_ _6"> </span>discuss</div><div class="t m0 x1 h6 y3a ff2 fs2 fc0 sc0 ls3 ws0">their<span class="_ _b"> </span>possible<span class="_ _6"> </span>improvements.<span class="_ _b"> </span>Finally<span class="_ _8"></span>,<span class="_ _6"> </span>we<span class="_ _6"> </span>list<span class="_ _6"> </span>a<span class="_ _b"> </span>number<span class="_ _6"> </span>of<span class="_ _6"> </span>countermeasures<span class="_ _6"> </span>to<span class="_ _6"> </span>reduce</div><div class="t m0 x1 h6 y3b ff2 fs2 fc0 sc0 ls5 ws0">the<span class="_ _0"> </span>impact<span class="_ _0"> </span>of<span class="_ _0"> </span>physical<span class="_ _0"> </span>information<span class="_ _0"> </span>leakages.</div><div class="t m0 x1 h5 y3c ff1 fs3 fc0 sc0 ls4 ws0">2.2<span class="_ _4"> </span>Basics<span class="_"> </span>of<span class="_"> </span>Side-Channel<span class="_"> </span>Attacks</div><div class="t m0 x1 hb y3d ff6 fs3 fc0 sc0 lsa ws0">2.2.1<span class="_ _4"> </span>Origin<span class="_"> </span>of<span class="_"> </span>the<span class="_"> </span>Leakages</div><div class="t m0 x1 h6 y3e ff2 fs2 fc0 sc0 ls5 ws0">Side-channel<span class="_ _9"> </span>attacks<span class="_ _a"> </span>are<span class="_ _5"> </span>closely<span class="_ _a"> </span>related<span class="_ _5"> </span>to<span class="_ _a"> </span>the<span class="_ _5"> </span>existence<span class="_ _9"> </span>of<span class="_ _a"> </span>ph<span class="_ _1"></span>ysically<span class="_ _9"> </span>observable</div><div class="t m0 x1 h6 y3f ff2 fs2 fc0 sc0 ls5 ws0">phenomenons<span class="_ _a"> </span>caused<span class="_ _a"> </span>by<span class="_ _a"> </span>the<span class="_ _a"> </span>e<span class="_ _1"></span>xecution<span class="_ _a"> </span>of<span class="_ _9"> </span>computing<span class="_ _a"> </span>tasks<span class="_ _a"> </span>in<span class="_ _a"> </span>present<span class="_ _a"> </span>microelec-</div><div class="t m0 x1 h6 y40 ff2 fs2 fc0 sc0 ls3 ws0">tronic<span class="_ _7"> </span>devices.<span class="_ _7"> </span>F<span class="_ _1"></span>or<span class="_ _7"> </span>example,<span class="_ _7"> </span>microprocessors<span class="_ _7"> </span>consume<span class="_ _7"> </span>time<span class="_ _7"> </span>and<span class="_ _7"> </span>power<span class="_ _7"> </span>to<span class="_ _7"> </span>perform</div><div class="t m0 x1 h6 y41 ff2 fs2 fc0 sc0 ls3 ws0">their<span class="_ _10"> </span>assigned<span class="_ _10"> </span>tasks.<span class="_ _10"> </span>They<span class="_ _d"> </span>also<span class="_ _10"> </span>radiate<span class="_ _4"> </span>an<span class="_ _d"> </span>electromagnetic<span class="_ _10"> </span>field,<span class="_ _10"> </span>dissipate<span class="_ _4"> </span>heat,</div><div class="t m0 x1 h6 y42 ff2 fs2 fc0 sc0 ls3 ws0">and<span class="_ _a"> </span>even<span class="_ _a"> </span>make<span class="_ _a"> </span>some<span class="_ _d"> </span>noise<span class="_ _a"> </span>[22].<span class="_ _d"> </span>As<span class="_ _a"> </span>a<span class="_ _d"> </span>matter<span class="_ _a"> </span>of<span class="_ _d"> </span>fact,<span class="_ _a"> </span>there<span class="_ _d"> </span>are<span class="_ _a"> </span>plenty<span class="_ _d"> </span>of<span class="_ _a"> </span>infor-</div><div class="t m0 x1 h6 y43 ff2 fs2 fc0 sc0 ls5 ws0">mation<span class="_ _5"> </span>sources<span class="_ _5"> </span>leaking<span class="_ _5"> </span>from<span class="_ _9"> </span>actual<span class="_ _5"> </span>computers<span class="_ _5"> </span>that<span class="_ _5"> </span>can<span class="_ _9"> </span>consequently<span class="_ _5"> </span>be<span class="_ _5"> </span>exploited</div><div class="t m0 x1 h6 y44 ff2 fs2 fc0 sc0 ls5 ws0">by<span class="_ _d"> </span>malicious<span class="_ _d"> </span>adversaries.<span class="_ _d"> </span>In<span class="_ _d"> </span>this<span class="_ _d"> </span>chapter,<span class="_ _d"> </span>we<span class="_ _d"> </span>focus<span class="_ _d"> </span>on<span class="_ _d"> </span>power<span class="_ _d"> </span>consumption<span class="_ _d"> </span>and</div><div class="t m0 x1 h6 y45 ff2 fs2 fc0 sc0 ls3 ws0">electromagnetic<span class="_ _0"> </span>radiation<span class="_ _7"> </span>that<span class="_ _0"> </span>are<span class="_ _7"> </span>two<span class="_ _0"> </span>frequently<span class="_ _7"> </span>considered<span class="_ _0"> </span>side-channels<span class="_ _7"> </span>in<span class="_ _0"> </span>prac-</div><div class="t m0 x1 h6 y46 ff2 fs2 fc0 sc0 ls5 ws0">tical<span class="_ _4"> </span>attacks.<span class="_ _10"> </span>Since<span class="_ _4"> </span>a<span class="_ _4"> </span>large<span class="_ _10"> </span>part<span class="_ _4"> </span>of<span class="_ _10"> </span>present<span class="_ _4"> </span>digital<span class="_ _4"> </span>circuits<span class="_ _4"> </span>is<span class="_ _10"> </span>based<span class="_ _4"> </span>on<span class="_ _4"> </span>CMOS</div><div class="t m0 x1 h6 y47 ff2 fs2 fc0 sc0 ls3 ws0">gates,<span class="_ _d"> </span>this<span class="_ _4"> </span>introduction<span class="_ _d"> </span>also<span class="_ _10"> </span>only<span class="_ _10"> </span>focuses<span class="_ _10"> </span>on<span class="_ _10"> </span>this<span class="_ _10"> </span>technology<span class="_ _8"></span>.<span class="_ _10"> </span>As<span class="_ _4"> </span>will<span class="_ _d"> </span>be<span class="_ _10"> </span>men-</div><div class="t m0 x1 h6 y48 ff2 fs2 fc0 sc0 ls5 ws0">tioned<span class="_ _a"> </span>in<span class="_ _a"> </span>Section<span class="_ _9"> </span>2.4,<span class="_ _a"> </span>other<span class="_ _a"> </span>types<span class="_ _a"> </span>of<span class="_ _9"> </span>logic<span class="_ _a"> </span>circuits<span class="_ _a"> </span>could<span class="_ _a"> </span>be<span class="_ _9"> </span>considered<span class="_ _a"> </span>for<span class="_ _a"> </span>side-</div><div class="t m0 x1 h6 y49 ff2 fs2 fc0 sc0 ls5 ws0">channel<span class="_ _0"> </span>attacks,<span class="_ _7"> </span>sometimes<span class="_ _0"> </span>providing<span class="_ _7"> </span>impro<span class="_ _1"></span>ved<span class="_ _0"> </span>resistance<span class="_ _7"> </span>compared<span class="_ _0"> </span>with<span class="_ _7"> </span>standard</div><div class="t m0 x1 h6 y4a ff2 fs2 fc0 sc0 lsb ws0">CMOS.</div><div class="t m0 x2 h6 y4b ff3 fs2 fc0 sc0 ls5 ws0">P<span class="_ _e"></span>ower<span class="_ _a"> </span>consumption<span class="_ _a"> </span>in<span class="_ _a"> </span>CMOS<span class="_ _9"> </span>devices.<span class="_ _a"> </span><span class="ff2 ls3">Static<span class="_ _a"> </span>CMOS<span class="_ _9"> </span>gates<span class="_ _a"> </span>hav<span class="_ _1"></span>e<span class="_ _a"> </span>three<span class="_ _9"> </span>distinct</span></div><div class="t m0 x1 h6 y4c ff2 fs2 fc0 sc0 ls3 ws0">dissipation<span class="_ _7"> </span>sources<span class="_ _5"> </span>[19].<span class="_ _7"> </span>The<span class="_ _5"> </span>first<span class="_ _7"> </span>one<span class="_ _5"> </span>is<span class="_ _7"> </span>due<span class="_ _5"> </span>to<span class="_ _7"> </span>the<span class="_ _5"> </span>leakage<span class="_ _5"> </span>currents<span class="_ _7"> </span>in<span class="_ _5"> </span>transistors.</div><div class="t m0 x1 h6 y4d ff2 fs2 fc0 sc0 ls3 ws0">The<span class="_ _9"> </span>second<span class="_ _a"> </span>one<span class="_ _9"> </span>is<span class="_ _9"> </span>due<span class="_ _a"> </span>to<span class="_ _9"> </span>the<span class="_ _9"> </span>so-called<span class="_ _a"> </span>short-circuit<span class="_ _9"> </span>currents:<span class="_ _a"> </span>there<span class="_ _5"> </span>exists<span class="_ _9"> </span>a<span class="_ _a"> </span>short</div><div class="t m0 x1 h6 y4e ff2 fs2 fc0 sc0 ls5 ws0">period<span class="_ _d"> </span>during<span class="_ _d"> </span>the<span class="_ _d"> </span>switching<span class="_ _a"> </span>of<span class="_ _d"> </span>a<span class="_ _d"> </span>gate<span class="_ _d"> </span>while<span class="_ _d"> </span>NMOS<span class="_ _d"> </span>and<span class="_ _d"> </span>PMOS<span class="_ _d"> </span>are<span class="_ _a"> </span>conducting</div></div><div class="pi" data-data='{"ctm":[2.037103,0.000000,0.000000,2.037103,0.000000,0.000000]}'></div></div>
<div id="pf3" class="pf w0 h0" data-page-no="3"><div class="pc pc3 w0 h0"><img class="bi x0 y0 w1 h1" alt="" src="https://static.pudn.com/prod/directory_preview_static/6257928560196e4b84b35cb8/bg3.jpg"><div class="t m0 x1 h8 y27 ff2 fs4 fc0 sc0 ls4 ws0">2<span class="_ _11"> </span>Introduction<span class="_ _b"> </span>to<span class="_ _6"> </span>Side-Channel<span class="_ _6"> </span>Attacks<span class="_ _12"> </span>29</div><div class="t m0 x1 hc y4f ff1 fs4 fc0 sc0 ls7 ws0">Fig.<span class="_"> </span>2.1<span class="_ _a"> </span><span class="ff2">Charge<span class="_ _6"> </span>vs.<span class="_ _b"> </span>discharge<span class="_ _6"> </span>of<span class="_ _6"> </span>a<span class="_ _6"> </span>CMOS<span class="_ _b"> </span>inv<span class="_ _1"></span>erter</span></div><div class="t m0 x1 h6 y50 ff2 fs2 fc0 sc0 ls5 ws0">simultaneously<span class="_ _8"></span>.<span class="_ _5"> </span>Finally<span class="_ _8"></span>,<span class="_ _5"> </span>the<span class="_ _5"> </span>dynamic<span class="_ _5"> </span>power<span class="_ _7"> </span>consumption<span class="_ _5"> </span>is<span class="_ _5"> </span>due<span class="_ _5"> </span>to<span class="_ _5"> </span>the<span class="_ _5"> </span>charge<span class="_ _5"> </span>and</div><div class="t m0 x1 h6 y51 ff2 fs2 fc0 sc0 lsb ws0">discharge<span class="_ _5"> </span>of<span class="_ _9"> </span>the<span class="_ _9"> </span>load<span class="_ _9"> </span>capacitance<span class="_ _9"> </span><span class="ff3 ls4">C</span></div><div class="t m0 x8 hd y52 ff3 fs7 fc0 sc0 ls4 ws0">L</div><div class="t m0 x9 h6 y53 ff2 fs2 fc0 sc0 ls5 ws0">represented<span class="_ _9"> </span>by<span class="_ _9"> </span>the<span class="_ _9"> </span>dotted<span class="_ _9"> </span>paths<span class="_ _9"> </span>in<span class="_ _9"> </span>Fig.<span class="_ _9"> </span>2.1.</div><div class="t m0 x1 h6 y54 ff2 fs2 fc0 sc0 ls5 ws0">The<span class="_ _5"> </span>respectiv<span class="_ _1"></span>e<span class="_ _5"> </span>importance<span class="_ _5"> </span>of<span class="_ _5"> </span>these<span class="_ _5"> </span>dissipation<span class="_ _5"> </span>sources<span class="_ _5"> </span>typically<span class="_ _5"> </span>depends<span class="_ _9"> </span>on<span class="_ _5"> </span>tech-</div><div class="t m0 x1 h6 y55 ff2 fs2 fc0 sc0 ls5 ws0">nology<span class="_ _7"> </span>scalings.<span class="_ _7"> </span>But<span class="_ _7"> </span>the<span class="_ _7"> </span>dynamic<span class="_ _7"> </span>power<span class="_ _7"> </span>consumption<span class="_ _7"> </span>is<span class="_ _7"> </span>particularly<span class="_ _7"> </span>rele<span class="_ _1"></span>v<span class="_ _1"></span>ant<span class="_ _7"> </span>from</div><div class="t m0 x1 h6 y56 ff2 fs2 fc0 sc0 ls5 ws0">a<span class="_ _9"> </span>side-channel<span class="_ _a"> </span>point<span class="_ _9"> </span>of<span class="_ _a"> </span>vie<span class="_ _1"></span>w<span class="_ _9"> </span>since<span class="_ _a"> </span>it<span class="_ _9"> </span>determines<span class="_ _9"> </span>a<span class="_ _a"> </span>simple<span class="_ _9"> </span>relationship<span class="_ _a"> </span>between<span class="_ _9"> </span>a</div><div class="t m0 x1 h6 y57 ff2 fs2 fc0 sc0 ls5 ws0">de<span class="_ _1"></span>vice’<span class="_ _8"></span>s<span class="_ _9"> </span>internal<span class="_ _9"> </span>data<span class="_ _9"> </span>and<span class="_ _9"> </span>its<span class="_ _9"> </span>externally<span class="_ _9"> </span>observable<span class="_ _5"> </span>power<span class="_ _5"> </span>consumption.<span class="_ _9"> </span>It<span class="_ _9"> </span>can<span class="_ _9"> </span>be</div><div class="t m0 x1 h6 y58 ff2 fs2 fc0 sc0 ls6 ws0">written<span class="_ _0"> </span>as</div><div class="t m0 xa he y59 ff3 fs2 fc0 sc0 ls4 ws0">P</div><div class="t m0 xb hf y5a ff7 fs7 fc0 sc0 ls4 ws0">dyn</div><div class="t m0 xc he y5b ff5 fs2 fc0 sc0 ls4 ws0">=<span class="_ _7"> </span><span class="ff3">C</span></div><div class="t m0 xd hd y5a ff3 fs7 fc0 sc0 ls4 ws0">L</div><div class="t m0 xe he y5b ff3 fs2 fc0 sc0 ls4 ws0">V</div><div class="t m0 xf h10 y5c ff2 fs7 fc0 sc0 ls4 ws0">2</div><div class="t m0 x10 hd y5d ff3 fs7 fc0 sc0 lsc ws0">DD</div><div class="t m0 x11 he y5b ff3 fs2 fc0 sc0 ls4 ws0">P</div><div class="t m0 x12 h10 y5a ff2 fs7 fc0 sc0 ls4 ws0">0<span class="ff5">→</span>1</div><div class="t m0 x13 h6 y5b ff3 fs2 fc0 sc0 ls4 ws0">f<span class="_ _13"> </span><span class="ff2 ls3">(2.1)</span></div><div class="t m0 x1 h6 y5e ff2 fs2 fc0 sc0 ls5 ws0">where<span class="_ _a"> </span><span class="ff3 ls4">P</span></div><div class="t m0 x14 h10 y5f ff2 fs7 fc0 sc0 ls4 ws0">0<span class="ff5">→</span>1</div><div class="t m0 x15 h6 y60 ff3 fs2 fc0 sc0 ls4 ws0">f<span class="_ _4"> </span><span class="ff2 ls3">is<span class="_ _5"> </span>called<span class="_ _5"> </span>the<span class="_ _5"> </span></span>switching<span class="_ _7"> </span>activity<span class="ff2">,<span class="_ _d"> </span></span>P</div><div class="t m0 x16 h10 y5f ff2 fs7 fc0 sc0 ls4 ws0">0<span class="ff5">→</span>1</div><div class="t m0 x17 h6 y60 ff2 fs2 fc0 sc0 ls3 ws0">is<span class="_ _5"> </span>the<span class="_ _7"> </span>probability<span class="_ _5"> </span>of<span class="_ _5"> </span>a<span class="_ _5"> </span>0<span class="_ _a"> </span><span class="ff5 ls4">→<span class="_ _a"> </span><span class="ff2">1</span></span></div><div class="t m0 x1 h6 y61 ff2 fs2 fc0 sc0 ls4 ws0">transition,<span class="_ _14"> </span><span class="ff3">f<span class="_ _14"> </span></span><span class="ls5">is<span class="_ _9"> </span>the<span class="_ _a"> </span>work<span class="_ _9"> </span>frequency<span class="_ _a"> </span>of<span class="_ _9"> </span>the<span class="_ _a"> </span>de<span class="_ _1"></span>vice,<span class="_ _a"> </span>and<span class="_ _a"> </span><span class="ff3 ls4">V</span></span></div><div class="t m0 x18 hd y62 ff3 fs7 fc0 sc0 lsc ws0">DD</div><div class="t m0 x19 h6 y63 ff2 fs2 fc0 sc0 ls3 ws0">is<span class="_ _a"> </span>the<span class="_ _9"> </span>voltage<span class="_ _9"> </span>of<span class="_ _a"> </span>the</div><div class="t m0 x1 h6 y64 ff2 fs2 fc0 sc0 ls5 ws0">po<span class="_ _1"></span>wer<span class="_ _6"> </span>supply<span class="_ _8"></span>.<span class="_ _0"> </span>In<span class="_ _6"> </span>CMOS<span class="_ _0"> </span>devices,<span class="_ _b"> </span>when<span class="_ _0"> </span>measuring<span class="_ _6"> </span>the<span class="_ _0"> </span>power<span class="_ _b"> </span>consumption<span class="_ _0"> </span>(either<span class="_ _6"> </span>at</div><div class="t m0 x1 h6 y65 ff2 fs2 fc0 sc0 ls5 ws0">the<span class="_ _7"> </span>ground<span class="_ _0"> </span>pin<span class="_ _7"> </span>or<span class="_ _7"> </span>at<span class="_ _0"> </span>the<span class="_ _7"> </span>power<span class="_ _0"> </span>pin),<span class="_ _7"> </span>the<span class="_ _7"> </span>highest<span class="_ _0"> </span>peak<span class="_ _7"> </span>will<span class="_ _7"> </span>appear<span class="_ _7"> </span>during<span class="_ _0"> </span>the<span class="_ _7"> </span>charge</div><div class="t m0 x1 h6 y66 ff2 fs2 fc0 sc0 ls5 ws0">of<span class="_ _6"> </span>the<span class="_ _6"> </span>capacitance<span class="_ _6"> </span>(i.e.,<span class="_ _0"> </span>0<span class="_ _0"> </span><span class="ff5 ls4">→<span class="_ _7"> </span></span>1<span class="_ _6"> </span>event).<span class="_ _b"> </span>During<span class="_ _6"> </span>the<span class="_ _0"> </span>discharge,<span class="_ _b"> </span>the<span class="_ _6"> </span>only<span class="_ _0"> </span>current<span class="_ _6"> </span>we<span class="_ _6"> </span>can</div><div class="t m0 x1 h6 y67 ff2 fs2 fc0 sc0 ls5 ws0">measure<span class="_ _5"> </span>is<span class="_ _5"> </span>the<span class="_ _7"> </span>short-circuit<span class="_ _5"> </span>path<span class="_ _5"> </span>current.<span class="_ _5"> </span>This<span class="_ _5"> </span>data-dependent<span class="_ _5"> </span>power<span class="_ _7"> </span>consumption</div><div class="t m0 x1 h6 y68 ff2 fs2 fc0 sc0 ls3 ws0">is<span class="_ _0"> </span>the<span class="_ _0"> </span>origin<span class="_ _0"> </span>of<span class="_ _0"> </span>side-channel<span class="_ _0"> </span>information<span class="_ _0"> </span>leakages.</div><div class="t m0 x2 h6 y69 ff3 fs2 fc0 sc0 ls3 ws0">EM<span class="_ _b"> </span>radiation<span class="_ _b"> </span>in<span class="_ _b"> </span>CMOS<span class="_ _b"> </span>devices.<span class="_ _b"> </span><span class="ff2 ls5">Just<span class="_ _b"> </span>as<span class="_ _6"> </span>the<span class="_ _b"> </span>power<span class="_ _b"> </span>consumption<span class="_ _b"> </span>of<span class="_ _b"> </span>CMOS<span class="_ _6"> </span>de<span class="_ _1"></span>vices</span></div><div class="t m0 x1 h6 y6a ff2 fs2 fc0 sc0 ls3 ws0">is<span class="_ _0"> </span>data-dependent,<span class="_ _7"> </span>it<span class="_ _7"> </span>can<span class="_ _0"> </span>be<span class="_ _7"> </span>showed<span class="_ _0"> </span>that<span class="_ _0"> </span>its<span class="_ _7"> </span>electromagnetic<span class="_ _7"> </span>radiation<span class="_ _0"> </span>also<span class="_ _7"> </span>is.<span class="_ _0"> </span>From</div><div class="t m0 x1 h6 y6b ff2 fs2 fc0 sc0 ls5 ws0">a<span class="_ _6"> </span>t<span class="_"> </span>heoretical<span class="_ _0"> </span>point<span class="_ _0"> </span>of<span class="_ _0"> </span>view<span class="_ _e"></span>,<span class="_ _0"> </span>electromagnetic<span class="_ _0"> </span>leakages<span class="_ _6"> </span>are<span class="_ _0"> </span>usually<span class="_ _0"> </span>explained<span class="_ _6"> </span>from<span class="_ _0"> </span>the</div><div class="t m0 x1 h6 y6c ff2 fs2 fc0 sc0 ls3 ws0">Biot–Sav<span class="_ _8"></span>art<span class="_ _0"> </span>law:</div><div class="t m0 x1a h4 y6d ff3 fs2 fc0 sc0 ls4 ws0">d<span class="_ _3"></span><span class="ff1">B<span class="_ _7"> </span><span class="ff5">=</span></span></div><div class="t m0 x1b h4 y6e ff8 fs2 fc0 sc0 ls4 ws0">μ<span class="_ _e"></span><span class="ff3 lsd">Id<span class="_ _15"> </span><span class="ff1 ls4">l<span class="_ _6"> </span><span class="ff5">×<span class="_ _15"></span><span class="ff9"><span class="_ _16"></span><span class="ff3">r</span></span></span></span></span></div><div class="t m0 x1c h6 y6f ff2 fs2 fc0 sc0 ls4 ws0">4<span class="ff8">π<span class="_ _3"></span><span class="ff3">r</span></span></div><div class="t m0 x1d h10 y70 ff2 fs7 fc0 sc0 ls4 ws0">2</div><div class="t m0 x1e h6 y71 ff2 fs2 fc0 sc0 ls3 ws0">(2.2)</div><div class="t m0 x1 h6 y72 ff2 fs2 fc0 sc0 ls5 ws0">where<span class="_ _9"> </span><span class="ff8 ls4">μ<span class="_ _a"> </span></span><span class="ls3">is<span class="_ _9"> </span>the<span class="_ _9"> </span>magnetic<span class="_ _a"> </span>permeability<span class="_ _e"></span>,<span class="_ _d"> </span><span class="ff3 ls4">I<span class="_ _4"> </span></span><span class="ls5">is<span class="_ _a"> </span>the<span class="_ _5"> </span>current<span class="_ _a"> </span>carried<span class="_ _9"> </span>on<span class="_ _a"> </span>a<span class="_ _5"> </span>conductor<span class="_ _a"> </span>of</span></span></div><div class="t m0 x1 h4 y73 ff2 fs2 fc0 sc0 ls3 ws0">infinitesimal<span class="_ _0"> </span>length<span class="_ _7"> </span><span class="ff3 ls4">d<span class="_ _3"></span><span class="ff1">l<span class="ff2">,<span class="_ _17"> </span><span class="ff9"><span class="_ _16"></span><span class="ff3">r<span class="_ _a"> </span><span class="ff2 ls5">is<span class="_ _0"> </span>the<span class="_ _7"> </span>unit<span class="_ _0"> </span>vector<span class="_ _0"> </span>specifying<span class="_ _7"> </span>the<span class="_ _0"> </span>distance<span class="_ _7"> </span>between<span class="_ _0"> </span>the<span class="_ _7"> </span>cur-</span></span></span></span></span></span></div><div class="t m0 x1 h6 y74 ff2 fs2 fc0 sc0 lsb ws0">rent<span class="_ _6"> </span>element<span class="_ _6"> </span>and<span class="_ _6"> </span>the<span class="_ _0"> </span>field<span class="_ _6"> </span>point,<span class="_ _6"> </span>and<span class="_ _6"> </span><span class="ff3 ls4">r<span class="_ _5"> </span></span><span class="ls3">is<span class="_ _6"> </span>the<span class="_ _6"> </span>distance<span class="_ _0"> </span>from<span class="_ _6"> </span>the<span class="_ _6"> </span>current<span class="_ _6"> </span>element<span class="_ _6"> </span>to<span class="_ _0"> </span>the</span></div><div class="t m0 x1 h6 y75 ff2 fs2 fc0 sc0 ls5 ws0">field<span class="_ _0"> </span>point.<span class="_ _7"> </span>Although<span class="_ _0"> </span>such<span class="_ _7"> </span>a<span class="_ _0"> </span>simple<span class="_ _0"> </span>equation<span class="_ _7"> </span>does<span class="_ _0"> </span>not<span class="_ _7"> </span>describe<span class="_ _0"> </span>the<span class="_ _7"> </span>exact<span class="_ _0"> </span>(complex)</div><div class="t m0 x1 h6 y76 ff2 fs2 fc0 sc0 ls3 ws0">radiation<span class="_ _0"> </span>of<span class="_ _7"> </span>an<span class="_ _0"> </span>integrated<span class="_ _0"> </span>circuit,<span class="_ _0"> </span>it<span class="_ _0"> </span>already<span class="_ _7"> </span>emphasizes<span class="_ _0"> </span>two<span class="_ _0"> </span>important<span class="_ _7"> </span>facts:<span class="_ _6"> </span>(1)<span class="_ _7"> </span>the</div></div><div class="pi" data-data='{"ctm":[2.037103,0.000000,0.000000,2.037103,0.000000,0.000000]}'></div></div>
<div id="pf4" class="pf w0 h0" data-page-no="4"><div class="pc pc4 w0 h0"><img class="bi x0 y0 w1 h1" alt="" src="https://static.pudn.com/prod/directory_preview_static/6257928560196e4b84b35cb8/bg4.jpg"><div class="t m0 x1 h8 y27 ff2 fs4 fc0 sc0 ls9 ws0">30<span class="_ _f"> </span><span class="ls7">F<span class="_ _8"></span>.-X.<span class="_ _b"> </span>Standaert</span></div><div class="t m0 x1 h6 y28 ff2 fs2 fc0 sc0 ls5 ws0">field<span class="_ _5"> </span>is<span class="_ _5"> </span>data-dependent<span class="_ _5"> </span>due<span class="_ _9"> </span>to<span class="_ _5"> </span>the<span class="_ _5"> </span>dependence<span class="_ _9"> </span>on<span class="_ _5"> </span>the<span class="_ _5"> </span>current<span class="_ _9"> </span>intensity<span class="_ _5"> </span>and<span class="_ _5"> </span>(2)<span class="_ _5"> </span>the</div><div class="t m0 x1 h6 y29 ff2 fs2 fc0 sc0 ls5 ws0">field<span class="_ _a"> </span>orientation<span class="_ _a"> </span>depends<span class="_ _a"> </span>on<span class="_ _d"> </span>the<span class="_ _a"> </span>current<span class="_ _a"> </span>direction.<span class="_ _a"> </span>This<span class="_ _a"> </span>data-dependent<span class="_ _d"> </span>radiation</div><div class="t m0 x1 h6 y2a ff2 fs2 fc0 sc0 ls5 ws0">is<span class="_ _a"> </span>again<span class="_ _d"> </span>the<span class="_ _d"> </span>origin<span class="_ _a"> </span>of<span class="_ _d"> </span>side-channel<span class="_ _d"> </span>information<span class="_ _a"> </span>leakages.<span class="_ _d"> </span>In<span class="_ _d"> </span>general,<span class="_ _a"> </span>any<span class="_ _d"> </span>physi-</div><div class="t m0 x1 h6 y2b ff2 fs2 fc0 sc0 ls5 ws0">cally<span class="_ _a"> </span>observ<span class="_ _8"></span>able<span class="_ _a"> </span>phenomenon<span class="_ _a"> </span>that<span class="_ _9"> </span>can<span class="_ _a"> </span>be<span class="_ _9"> </span>related<span class="_ _a"> </span>to<span class="_ _a"> </span>the<span class="_ _9"> </span>internal<span class="_ _a"> </span>configuration<span class="_ _9"> </span>or</div><div class="t m0 x1 h6 y2c ff2 fs2 fc0 sc0 ls5 ws0">activ<span class="_ _1"></span>ity<span class="_ _7"> </span>of<span class="_ _5"> </span>a<span class="_ _7"> </span>cryptographic<span class="_ _7"> </span>device<span class="_ _7"> </span>can<span class="_ _7"> </span>be<span class="_ _5"> </span>a<span class="_ _7"> </span>source<span class="_ _7"> </span>of<span class="_ _5"> </span>useful<span class="_ _7"> </span>information<span class="_ _7"> </span>to<span class="_ _5"> </span>a<span class="_ _7"> </span>mali-</div><div class="t m0 x1 h6 y2d ff2 fs2 fc0 sc0 ls3 ws0">cious<span class="_ _0"> </span>adversary<span class="_ _e"></span>.</div><div class="t m0 x2 h6 y2e ff3 fs2 fc0 sc0 ls5 ws0">Leakage<span class="_ _b"> </span>models.<span class="_ _6"> </span><span class="ff2">From<span class="_ _6"> </span>the<span class="_ _0"> </span>pre<span class="_ _1"></span>vious<span class="_ _6"> </span>physical<span class="_ _6"> </span>facts,<span class="_ _6"> </span>side-channel<span class="_ _6"> </span>adversaries<span class="_ _b"> </span>have</span></div><div class="t m0 x1 h6 y2f ff2 fs2 fc0 sc0 ls5 ws0">deriv<span class="_ _8"></span>ed<span class="_ _7"> </span>a<span class="_ _0"> </span>number<span class="_ _0"> </span>of<span class="_ _0"> </span>(more<span class="_ _0"> </span>or<span class="_ _7"> </span>less<span class="_ _0"> </span>sophisticated)<span class="_ _0"> </span>leakage<span class="_ _0"> </span>models.<span class="_ _0"> </span>They<span class="_ _0"> </span>can<span class="_ _0"> </span>be<span class="_ _7"> </span>used</div><div class="t m0 x1 h6 y30 ff2 fs2 fc0 sc0 ls5 ws0">both<span class="_ _5"> </span>to<span class="_ _5"> </span>simulate<span class="_ _5"> </span>the<span class="_ _7"> </span>attacks<span class="_ _5"> </span>or<span class="_ _5"> </span>to<span class="_ _5"> </span>improve<span class="_ _7"> </span>an<span class="_ _5"> </span>attack’<span class="_ _1"></span>s<span class="_ _7"> </span>efficiency<span class="_ _e"></span>.<span class="_ _5"> </span>For<span class="_ _5"> </span>example,<span class="_ _7"> </span>the</div><div class="t m0 x1 h6 y31 ff3 fs2 fc0 sc0 ls5 ws0">Hamming<span class="_ _a"> </span>distance<span class="_ _d"> </span>model<span class="_ _a"> </span><span class="ff2">assumes<span class="_ _a"> </span>that,<span class="_ _d"> </span>when<span class="_ _a"> </span>a<span class="_ _d"> </span>v<span class="_ _1"></span>alue<span class="_ _d"> </span><span class="ff3 ls4">x</span></span></div><div class="t m0 x1f h10 y77 ff2 fs7 fc0 sc0 ls4 ws0">0</div><div class="t m0 x20 h6 y78 ff2 fs2 fc0 sc0 ls5 ws0">contained<span class="_ _a"> </span>in<span class="_ _d"> </span>a<span class="_ _a"> </span>CMOS</div><div class="t m0 x1 h6 y79 ff2 fs2 fc0 sc0 ls5 ws0">de<span class="_ _1"></span>vice<span class="_ _0"> </span>switches<span class="_ _6"> </span>into<span class="_ _0"> </span>a<span class="_ _0"> </span>v<span class="_ _1"></span>alue<span class="_ _0"> </span><span class="ff3 ls4">x</span></div><div class="t m0 x21 h10 y7a ff2 fs7 fc0 sc0 ls4 ws0">1</div><div class="t m0 x22 h6 y7b ff2 fs2 fc0 sc0 ls5 ws0">,<span class="_ _6"> </span>the<span class="_ _0"> </span>actual<span class="_ _0"> </span>side-channel<span class="_ _0"> </span>leakages<span class="_ _6"> </span>are<span class="_ _0"> </span>correlated<span class="_ _0"> </span>with</div><div class="t m0 x1 h6 y7c ff2 fs2 fc0 sc0 ls5 ws0">the<span class="_ _9"> </span>Hamming<span class="_ _a"> </span>distance<span class="_ _5"> </span>of<span class="_ _a"> </span>these<span class="_ _9"> </span>values,<span class="_ _5"> </span>namely<span class="_ _d"> </span><span class="ff3 ls4">H</span></div><div class="t m0 x23 hd y7d ff3 fs7 fc0 sc0 ls4 ws0">D</div><div class="t m0 x24 h6 y7e ff2 fs2 fc0 sc0 ls4 ws0">(<span class="_ _18"></span><span class="ff3">x</span></div><div class="t m0 x25 h10 y7d ff2 fs7 fc0 sc0 ls4 ws0">0</div><div class="t m0 x26 he y7e ff8 fs2 fc0 sc0 ls4 ws0">,<span class="_ _b"> </span><span class="ff3">x</span></div><div class="t m0 x27 h10 y7d ff2 fs7 fc0 sc0 ls4 ws0">1</div><div class="t m0 x28 h6 y7e ff2 fs2 fc0 sc0 ls4 ws0">)<span class="_ _10"> </span><span class="ff5">=<span class="_ _14"> </span><span class="ff3">H</span></span></div><div class="t m0 x29 hd y7d ff3 fs7 fc0 sc0 ls4 ws0">W</div><div class="t m0 x2a h6 y7e ff2 fs2 fc0 sc0 ls4 ws0">(<span class="_ _18"></span><span class="ff3">x</span></div><div class="t m0 x2b h10 y7d ff2 fs7 fc0 sc0 ls4 ws0">0</div><div class="t m0 x2c he y7e ff5 fs2 fc0 sc0 ls4 ws0">⊕<span class="_"> </span><span class="ff3">x</span></div><div class="t m0 x2d h10 y7d ff2 fs7 fc0 sc0 ls4 ws0">1</div><div class="t m0 x2e h6 y7e ff2 fs2 fc0 sc0 ls4 ws0">).<span class="_ _9"> </span>The</div><div class="t m0 x1 h6 y7f ff3 fs2 fc0 sc0 lsb ws0">Hamming<span class="_ _7"> </span>weigh<span class="_ _7"> </span>model<span class="_ _7"> </span><span class="ff2 ls5">is<span class="_ _7"> </span>even<span class="_ _7"> </span>simpler<span class="_ _7"> </span>and<span class="_ _7"> </span>assumes<span class="_ _7"> </span>that,<span class="_ _7"> </span>when<span class="_ _7"> </span>a<span class="_ _7"> </span>value<span class="_ _5"> </span></span><span class="ls4">x</span></div><div class="t m0 x2f h10 y80 ff2 fs7 fc0 sc0 ls4 ws0">0</div><div class="t m0 x30 h6 y81 ff2 fs2 fc0 sc0 ls3 ws0">is<span class="_ _7"> </span>com-</div><div class="t m0 x1 h6 y82 ff2 fs2 fc0 sc0 ls5 ws0">puted<span class="_ _6"> </span>in<span class="_ _6"> </span>a<span class="_ _6"> </span>device,<span class="_ _6"> </span>the<span class="_ _6"> </span>actual<span class="_ _6"> </span>side-channel<span class="_ _0"> </span>leakages<span class="_ _6"> </span>are<span class="_ _6"> </span>correlated<span class="_ _6"> </span>with<span class="_ _0"> </span>the<span class="_ _6"> </span>Hamming</div><div class="t m0 x1 h6 y83 ff2 fs2 fc0 sc0 ls5 ws0">weight<span class="_ _7"> </span>of<span class="_ _5"> </span>this<span class="_ _5"> </span>va<span class="_ _1"></span>lue,<span class="_ _5"> </span>namely<span class="_ _a"> </span><span class="ff3 ls4">H</span></div><div class="t m0 xb hd y84 ff3 fs7 fc0 sc0 ls4 ws0">W</div><div class="t m0 x31 h6 y85 ff2 fs2 fc0 sc0 ls4 ws0">(<span class="_ _18"></span><span class="ff3">x</span></div><div class="t m0 x32 h10 y84 ff2 fs7 fc0 sc0 ls4 ws0">0</div><div class="t m0 x33 h6 y85 ff2 fs2 fc0 sc0 ls3 ws0">).<span class="_ _7"> </span>As<span class="_ _5"> </span>will<span class="_ _5"> </span>be<span class="_ _7"> </span>emphasized<span class="_ _5"> </span>in<span class="_ _5"> </span>Section<span class="_ _7"> </span>2.4,<span class="_ _5"> </span>good</div><div class="t m0 x1 h6 y86 ff2 fs2 fc0 sc0 ls5 ws0">leakage<span class="_ _a"> </span>models<span class="_ _a"> </span>hav<span class="_ _1"></span>e<span class="_ _a"> </span>a<span class="_ _a"> </span>strong<span class="_ _a"> </span>impact<span class="_ _a"> </span>on<span class="_ _a"> </span>the<span class="_ _a"> </span>efficienc<span class="_ _1"></span>y<span class="_ _a"> </span>of<span class="_ _a"> </span>a<span class="_ _a"> </span>side-channel<span class="_ _a"> </span>attack.</div><div class="t m0 x1 h6 y87 ff2 fs2 fc0 sc0 ls5 ws0">Hamming<span class="_ _a"> </span>weight<span class="_ _9"> </span>and<span class="_ _a"> </span>distance<span class="_ _9"> </span>models<span class="_ _a"> </span>assume<span class="_ _a"> </span>both<span class="_ _9"> </span>that<span class="_ _a"> </span>there<span class="_ _9"> </span>are<span class="_ _a"> </span>no<span class="_ _9"> </span>differences</div><div class="t m0 x1 h6 y88 ff2 fs2 fc0 sc0 lsb ws0">between<span class="_ _5"> </span>0<span class="_ _10"> </span><span class="ff5 ls4">→<span class="_ _d"> </span></span><span class="ls2">1<span class="_ _9"> </span>and<span class="_ _9"> </span>1<span class="_ _d"> </span><span class="ff5 ls4">→<span class="_ _10"> </span></span><span class="ls5">0<span class="_ _5"> </span>events<span class="_ _5"> </span>and<span class="_ _5"> </span>that<span class="_ _9"> </span>every<span class="_ _5"> </span>bit<span class="_ _5"> </span>in<span class="_ _9"> </span>an<span class="_ _9"> </span>implementation<span class="_ _9"> </span>con-</span></span></div><div class="t m0 x1 h6 y89 ff2 fs2 fc0 sc0 ls3 ws0">tributes<span class="_ _0"> </span>identically<span class="_ _0"> </span>to<span class="_ _7"> </span>the<span class="_ _0"> </span>ov<span class="_ _1"></span>erall<span class="_ _0"> </span>power<span class="_ _0"> </span>consumption.<span class="_ _7"> </span>Improv<span class="_ _8"></span>ed<span class="_ _7"> </span>models<span class="_ _0"> </span>relax<span class="_ _7"> </span>these</div><div class="t m0 x1 h6 y8a ff2 fs2 fc0 sc0 ls3 ws0">assumptions,<span class="_ _b"> </span>e.g.,<span class="_ _6"> </span>by<span class="_ _b"> </span>considering<span class="_ _6"> </span>dif<span class="_ _1"></span>ferent<span class="_ _b"> </span>leakages<span class="_ _6"> </span>for<span class="_ _b"> </span>the<span class="_ _6"> </span>0<span class="_ _7"> </span><span class="ff5 ls4">→<span class="_ _0"> </span></span><span class="ls2">1<span class="_ _6"> </span>and<span class="_ _b"> </span>1<span class="_ _7"> </span><span class="ff5 ls4">→<span class="_ _7"> </span></span><span class="ls5">0<span class="_ _b"> </span>ev<span class="_ _1"></span>ents</span></span></div><div class="t m0 x1 h6 y8b ff2 fs2 fc0 sc0 ls5 ws0">[18],<span class="_ _a"> </span>assigning<span class="_ _a"> </span>dif<span class="_ _1"></span>ferent<span class="_ _a"> </span>weights<span class="_ _a"> </span>to<span class="_ _a"> </span>the<span class="_ _a"> </span>leakage<span class="_ _a"> </span>contributions<span class="_ _a"> </span>of<span class="_ _a"> </span>an<span class="_ _a"> </span>implementa-</div><div class="t m0 x1 h6 y8c ff2 fs2 fc0 sc0 ls3 ws0">tion’<span class="_ _8"></span>s<span class="_ _0"> </span>different<span class="_ _0"> </span>parts<span class="_ _0"> </span>[23]<span class="_ _0"> </span>by<span class="_ _7"> </span>considering<span class="_ _0"> </span>advanced<span class="_ _0"> </span>statistical<span class="_ _0"> </span>tools<span class="_ _0"> </span>to<span class="_ _0"> </span>characterize<span class="_ _7"> </span>a</div><div class="t m0 x1 h6 y8d ff2 fs2 fc0 sc0 ls5 ws0">de<span class="_ _1"></span>vice’<span class="_ _8"></span>s<span class="_ _0"> </span>leakage<span class="_ _0"> </span>[6].</div><div class="t m0 x1 hb y8e ff6 fs3 fc0 sc0 ls4 ws0">2.2.2<span class="_ _4"> </span>Measurement<span class="_"> </span>Setups</div><div class="t m0 x1 h6 y8f ff2 fs2 fc0 sc0 ls5 ws0">As<span class="_ _9"> </span>far<span class="_ _9"> </span>as<span class="_ _a"> </span>the<span class="_ _9"> </span>practical<span class="_ _a"> </span>implementation<span class="_ _5"> </span>of<span class="_ _a"> </span>a<span class="_ _9"> </span>side-channel<span class="_ _a"> </span>attack<span class="_ _5"> </span>is<span class="_ _a"> </span>concerned,<span class="_ _9"> </span>the</div><div class="t m0 x1 h6 y90 ff2 fs2 fc0 sc0 ls5 ws0">building<span class="_ _b"> </span>of<span class="_ _b"> </span>a<span class="_ _b"> </span>good<span class="_ _b"> </span>measurement<span class="_ _6"> </span>setup<span class="_ _b"> </span>is<span class="_ _6"> </span>of<span class="_ _b"> </span>primary<span class="_ _b"> </span>importance.<span class="_ _6"> </span>They<span class="_ _b"> </span>aim<span class="_ _b"> </span>to<span class="_ _b"> </span>conv<span class="_ _8"></span>ert</div><div class="t m0 x1 h6 y91 ff2 fs2 fc0 sc0 ls5 ws0">the<span class="_ _5"> </span>physical<span class="_ _9"> </span>features<span class="_ _5"> </span>of<span class="_ _9"> </span>an<span class="_ _5"> </span>observable<span class="_ _5"> </span>device<span class="_ _5"> </span>into<span class="_ _5"> </span>digitally<span class="_ _9"> </span>exploitable<span class="_ _5"> </span>data.<span class="_ _5"> </span>Such</div><div class="t m0 x1 h6 y92 ff2 fs2 fc0 sc0 ls5 ws0">setups<span class="_ _0"> </span>are<span class="_ _0"> </span>generally<span class="_ _0"> </span>made<span class="_ _0"> </span>of<span class="_ _0"> </span>the<span class="_ _0"> </span>following<span class="_ _6"> </span>elements<span class="_ _0"> </span>[12]:</div><div class="t m0 x1 h6 y93 ff2 fs2 fc0 sc0 ls5 ws0">–<span class="_ _19"> </span>A<span class="_ _6"> </span>target<span class="_ _6"> </span>cryptographic<span class="_ _0"> </span>device,<span class="_ _6"> </span>e.g.,<span class="_ _0"> </span>a<span class="_ _6"> </span>smart<span class="_ _0"> </span>card,<span class="_ _0"> </span>FPGA<span class="_ _6"> </span>of<span class="_ _0"> </span>integrated<span class="_ _6"> </span>circuit<span class="_ _0"> </span>run-</div><div class="t m0 x34 h6 y94 ff2 fs2 fc0 sc0 ls3 ws0">ning<span class="_ _0"> </span>some<span class="_ _0"> </span>cryptographic<span class="_ _0"> </span>primitiv<span class="_ _1"></span>e,<span class="_ _0"> </span>e.g.,<span class="_ _0"> </span>a<span class="_ _0"> </span>block<span class="_ _0"> </span>cipher<span class="_ _8"></span>.</div><div class="t m0 x1 h6 y95 ff2 fs2 fc0 sc0 lsb ws0">–<span class="_ _19"> </span>If<span class="_ _a"> </span>not<span class="_ _a"> </span>embedded<span class="_ _a"> </span>on-chip,<span class="_ _a"> </span>an<span class="_ _a"> </span>e<span class="_ _1"></span>xternal<span class="_ _a"> </span>po<span class="_ _1"></span>wer<span class="_ _a"> </span>supply<span class="_ _8"></span>,<span class="_ _a"> </span>clock<span class="_ _a"> </span>generator<span class="_ _8"></span>,<span class="_ _a"> </span>and<span class="_ _a"> </span>any</div><div class="t m0 x34 h6 y96 ff2 fs2 fc0 sc0 ls3 ws0">additional<span class="_ _0"> </span>circuitry<span class="_ _0"> </span>required<span class="_ _0"> </span>for<span class="_ _0"> </span>the<span class="_ _0"> </span>device<span class="_ _6"> </span>to<span class="_ _0"> </span>run<span class="_ _0"> </span>properly<span class="_ _8"></span>.</div><div class="t m0 x1 h6 y97 ff2 fs2 fc0 sc0 ls5 ws0">–<span class="_ _19"> </span>A<span class="_ _b"> </span>leakage<span class="_ _6"> </span>probe.<span class="_ _6"> </span>For<span class="_ _b"> </span>example,<span class="_ _b"> </span>power<span class="_ _b"> </span>consumption<span class="_ _b"> </span>can<span class="_ _6"> </span>be<span class="_ _b"> </span>monitored<span class="_ _6"> </span>by<span class="_ _b"> </span>i<span class="_"> </span>nserting</div><div class="t m0 x34 h6 y98 ff2 fs2 fc0 sc0 ls3 ws0">a<span class="_ _a"> </span>small<span class="_ _a"> </span>resistor<span class="_ _a"> </span>within<span class="_ _a"> </span>the<span class="_ _9"> </span>supply<span class="_ _a"> </span>chain<span class="_ _a"> </span>of<span class="_ _a"> </span>the<span class="_ _a"> </span>target<span class="_ _a"> </span>de<span class="_ _8"></span>vice.<span class="_ _a"> </span>Electromagnetic</div><div class="t m0 x34 h6 y99 ff2 fs2 fc0 sc0 ls5 ws0">radiation<span class="_ _0"> </span>can<span class="_ _0"> </span>be<span class="_ _0"> </span>captured<span class="_ _0"> </span>with<span class="_ _0"> </span>simple<span class="_ _0"> </span>handmade<span class="_ _0"> </span>coils.</div><div class="t m0 x1 h6 y9a ff2 fs2 fc0 sc0 ls3 ws0">–<span class="_ _19"> </span>An<span class="_ _b"> </span>acquisition<span class="_ _6"> </span>device,<span class="_ _b"> </span>e.g.,<span class="_ _b"> </span>digital<span class="_ _6"> </span>oscilloscope<span class="_ _b"> </span>with<span class="_ _6"> </span>sufficient<span class="_ _b"> </span>features<span class="_ _b"> </span>(typically<span class="_ _8"></span>,</div><div class="t m0 x34 h6 y9b ff2 fs2 fc0 sc0 ls3 ws0">1<span class="_ _17"> </span>GS/s,<span class="_ _0"> </span>8<span class="_ _6"> </span>bits<span class="_ _0"> </span>of<span class="_ _6"> </span>resolution,<span class="_ _0"> </span>etc.),<span class="_ _6"> </span>connected<span class="_ _0"> </span>to<span class="_ _0"> </span>a<span class="_ _6"> </span>computer<span class="_ _0"> </span>for<span class="_ _6"> </span>the<span class="_ _0"> </span>statistical<span class="_ _6"> </span>anal-</div><div class="t m0 x34 h6 y9c ff2 fs2 fc0 sc0 ls5 ws0">ysis<span class="_ _0"> </span>of<span class="_ _0"> </span>the<span class="_ _0"> </span>side-channel<span class="_ _0"> </span>traces.</div></div><div class="pi" data-data='{"ctm":[2.037103,0.000000,0.000000,2.037103,0.000000,0.000000]}'></div></div>