- Title
- Investigating the utilization of the secure hash algorithm to generate electromagnetic noise
- Creator
- Frieslaar, Ibraheem, Irwin, Barry V W
- Subject
- To be catalogued
- Date
- 2017
- Type
- text
- Type
- article
- Identifier
- http://hdl.handle.net/10962/430222
- Identifier
- vital:72674
- Identifier
- https://doi.org/10.1145/3163080.3163089
- Description
- This research introduces an electromagnetic (EM) noise generator known as the FRIES noise generator to mitigate and obfuscate Side Channel Analysis (SCA) attacks against a Raspberry Pi. The FRIES noise generator utilizes the implementation of the Secure Hash Algorithm (SHA) from OpenSSL to generate white noise within the EM spectrum. This research further contributes to the body of knowledge by demonstrating that the SHA implementation of libcrypto++ and OpenSSL had different EM signatures. It was further revealed that as a more secure implementation of the SHA was executed additional data lines were used, resulting in increased EM emissions. It was demonstrated that the OpenSSL implementations of the SHA was more optimized as opposed to the libcrypto++ implementation by utilizing less resources and not leaving the device in a bottleneck. The FRIES daemon added noise to the EM leakage which prevents the visual location of the AES-128 cryptographic implementation. Finally, the cross-correlation test demonstrated that the EM features of the AES-128 algorithm was not detected within the FRIES noise.
- Format
- 6 pages, pdf
- Language
- English
- Relation
- Proceedings of the 9th International Conference on Signal Processing Systems, Frieslaar, I. and Irwin, B., 2017, November. Investigating the utilization of the secure hash algorithm to generate electromagnetic noise. In Proceedings of the 9th International Conference on Signal Processing Systems (pp. 164-169), Proceedings of the 9th International Conference on Signal Processing Systems volume 2017 number 1 164 169 2017 978-1-4503-5384-7
- Rights
- Publisher
- Rights
- Use of this resource is governed by the terms and conditions of the ACM Digital Library Statement (https://libraries.acm.org/digital-library/policies#anchor3)
- Hits: 63
- Visitors: 64
- Downloads: 3
Thumbnail | File | Description | Size | Format | |||
---|---|---|---|---|---|---|---|
View Details | SOURCE1 | Investigating the utilization of the secure hash algorithm to generate electromagnetic noise.pdf | 697 KB | Adobe Acrobat PDF | View Details |