Visible to the public Investigating the Utilization of the Secure Hash Algorithm to Generate Electromagnetic Noise

TitleInvestigating the Utilization of the Secure Hash Algorithm to Generate Electromagnetic Noise
Publication TypeConference Paper
Year of Publication2017
AuthorsFrieslaar, Ibraheem, Irwin, Barry
Conference NameProceedings of the 9th International Conference on Signal Processing Systems
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5384-7
KeywordsAES-128, electromagnetic, Human Behavior, Metrics, Noise Generator, pubcrawl, Raspberry Pi, Scalability, SHA, Tamper resistance
AbstractThis research introduces an electromagnetic (EM) noise generator known as the FRIES noise generator to mitigate and obfuscate Side Channel Analysis (SCA) attacks against a Raspberry Pi. The FRIES noise generator utilizes the implementation of the Secure Hash Algorithm (SHA) from OpenSSL to generate white noise within the EM spectrum. This research further contributes to the body of knowledge by demonstrating that the SHA implementation of libcrypto++ and OpenSSL had different EM signatures. It was further revealed that as a more secure implementation of the SHA was executed additional data lines were used, resulting in increased EM emissions. It was demonstrated that the OpenSSL implementations of the SHA was more optimized as opposed to the libcrypto++ implementation by utilizing less resources and not leaving the device in a bottleneck. The FRIES daemon added noise to the EM leakage which prevents the visual location of the AES-128 cryptographic implementation. Finally, the cross-correlation test demonstrated that the EM features of the AES-128 algorithm was not detected within the FRIES noise.
URLhttp://doi.acm.org/10.1145/3163080.3163089
DOI10.1145/3163080.3163089
Citation Keyfrieslaar_investigating_2017