all InfoSec news
Determining the Optimal Frequencies for a Duplicated Randomized Clock SCA Countermeasure. (arXiv:2307.13834v1 [cs.CR])
cs.CR updates on arXiv.org arxiv.org
Side-channel attacks pose significant challenges to the security of embedded
systems, often allowing attackers to circumvent encryption algorithms in
minutes compared to the trillions of years required for brute-force attacks. To
mitigate these vulnerabilities, various countermeasures have been developed.
This study focuses on two specific countermeasures: randomization of the
encryption algorithm's clock and the incorporation of a dummy core to disguise
power traces.
The objective of this research is to identify the optimal frequencies that
yield the highest level of …
algorithms attackers attacks brute brute-force challenges channel countermeasures embedded embedded systems encryption randomization sca security side-channel side-channel attacks study systems vulnerabilities