All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Side-Channel Analysis of Cryptographic Processor CEC 1702

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21240%2F23%3A00366811" target="_blank" >RIV/68407700:21240/23:00366811 - isvavai.cz</a>

  • Result on the web

    <a href="https://doi.org/10.1109/MECO58584.2023.10155040" target="_blank" >https://doi.org/10.1109/MECO58584.2023.10155040</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1109/MECO58584.2023.10155040" target="_blank" >10.1109/MECO58584.2023.10155040</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Side-Channel Analysis of Cryptographic Processor CEC 1702

  • Original language description

    Cryptography is omnipresent in our daily life, as we need it for trusted authentication (e.g., in access systems), secure communication, ensuring data integrity and confidentiality, and many more. However, even if mathematically secure ciphers are used, the device running the cryptographic algorithms is still vul-nerable to side-channel attacks that may reveal the secrets. These attacks exploit the fact that power consumption or electromagnetic emanation of the device depends on processed data. To prevent such an attack, the designer must employ countermeasures, such as masking, hiding, or shuffling. In this paper, we focus on Microchip CEC1702 microcontroller that supports common cryptographic operations in hardware. We analyze the resistance of its AES accelerator against correlation power analysis (CPA). We analyzed 100 million power traces by first-order CPA and univariate second-order CPA. In neither case did we find any vulnerability.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    20206 - Computer hardware and architecture

Result continuities

  • Project

    <a href="/en/project/VJ02010010" target="_blank" >VJ02010010: Tools for AI-enhanced Security Verification of Cryptographic Devices</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2023

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Proceedings of 2023 12th Mediterranean Conference on Embedded Computing (MECO)

  • ISBN

    979-8-3503-2291-0

  • ISSN

    2637-9511

  • e-ISSN

    2637-9511

  • Number of pages

    4

  • Pages from-to

  • Publisher name

    IEEE

  • Place of publication

    Piscataway

  • Event location

    Budva

  • Event date

    Jun 6, 2023

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article