Title | Investigating the Utilization of the Secure Hash Algorithm to Generate Electromagnetic Noise |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Frieslaar, Ibraheem, Irwin, Barry |
Conference Name | Proceedings of the 9th International Conference on Signal Processing Systems |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-5384-7 |
Keywords | AES-128, electromagnetic, Human Behavior, Metrics, Noise Generator, pubcrawl, Raspberry Pi, Scalability, SHA, Tamper resistance |
Abstract | This research introduces an electromagnetic (EM) noise generator known as the FRIES noise generator to mitigate and obfuscate Side Channel Analysis (SCA) attacks against a Raspberry Pi. The FRIES noise generator utilizes the implementation of the Secure Hash Algorithm (SHA) from OpenSSL to generate white noise within the EM spectrum. This research further contributes to the body of knowledge by demonstrating that the SHA implementation of libcrypto++ and OpenSSL had different EM signatures. It was further revealed that as a more secure implementation of the SHA was executed additional data lines were used, resulting in increased EM emissions. It was demonstrated that the OpenSSL implementations of the SHA was more optimized as opposed to the libcrypto++ implementation by utilizing less resources and not leaving the device in a bottleneck. The FRIES daemon added noise to the EM leakage which prevents the visual location of the AES-128 cryptographic implementation. Finally, the cross-correlation test demonstrated that the EM features of the AES-128 algorithm was not detected within the FRIES noise. |
URL | http://doi.acm.org/10.1145/3163080.3163089 |
DOI | 10.1145/3163080.3163089 |
Citation Key | frieslaar_investigating_2017 |