Accelerating Side Channel Analysis with Distributed and Parallelized Processing

Although there is no theoretical weakness in a cryptographic algorithm, Side Channel Analysis can find out some secret data from the physical implementation of a cryptosystem. The analysis is based on extra information such as timing information, power consumption, electromagnetic leaks or even sound which can be exploited to break the system. Differential Power Analysis is one of the most popular analyses, as computing the statistical correlations of the secret keys and power consumptions. It is usually necessary to calculate huge data and takes a long time. It may take several weeks for some devices with countermeasures. We suggest and evaluate the methods to shorten the time to analyze cryptosystems. Our methods include distributed computing and parallelized processing.





References:
[1] P. Kocher, J. Jaffe, and B. Jun, Differential power analysis, Advances In Cryptology - CRYPTO' 99, LNCS 1666 Springer-Verlag, pp. 388-397, Santa Barbara, USA, August 1999
[2] S. B. Örs, E. Oswald, B. Preneel, Power-Analysis Attacks on an FPGA - First Experimental Results, CHES 2003.
[3] Hans ChristophHudde, GPU assisted Mutual Information Analysis Attacks on AES, Bachelor Thesis, Ruhr-Universität Bochum, April 2010
[4] Riscure Inspector, https://www.riscure.com/security-tools/inspector-sca/, 2014.3
[5] Brightsight Sideways, http://www.brightsight.com/tools/sideways, 2014.3