Exploiting side-channels in cybersecurity

Authors

  • Tjaž Štok University of Ljubljana, Faculty of Computer and Information Science
  • Matevž Pesek University of Ljubljana, Faculty of Computer and Information Science

DOI:

https://doi.org/10.31449/upinf.234

Keywords:

cybersecurity, cryptography, cryptanalysis

Abstract

When implementing cryptographic primitives in software, we often resort to optimizing the software code in order to reduce additional computation time. Such decisions can have negative consequences on data leakage outside the implementation. Attackers can exploit the additional information generated by the execution of the software solution in a way that gives them additional insights into the operation of the program, the values calculated and access to the data itself. Insights can be gained in the form of execution time, memory access patterns, power consumption, and other seemingly unrelated system parameters. Such attacks are referred to as ``side-channel attacks''.

This paper presents several examples of such attacks and the magnitude of information leakage and how to protect against them. Time-based cryptanalysis, power-based cryptanalysis and its special variant -- video-based cryptanalysis -- and memory-based cryptanalysis are described. A simple timing cryptanalysis attack is used as an example to present the analysis process and the results before and after the implementation of the proposed mitigation.

Author Biographies

  • Tjaž Štok, University of Ljubljana, Faculty of Computer and Information Science

    Tjaž Štok je študent na Fakulteti za računalništvo in informatiko Univerze v Ljubljani. Zanimajo ga področja razvoja programske opreme in kibernetske varnosti. Njegovi raziskovalni interesi zajemajo teorijo kriptografije in razvoja varne programske opreme.

  • Matevž Pesek, University of Ljubljana, Faculty of Computer and Information Science

    Matevž Pesek je docent in raziskovalec na Fakulteti za računalništvo in informatiko Univerze v Ljubljani, kjer je diplomiral (2012) in doktoriral (2018). Od leta 2009 je član Laboratorija za računalniško grafiko in multimedije. Od leta 2024 izvaja predmet Varnost programov.

Published

2024-09-13

Issue

Section

Review scientific articles

How to Cite

[1]
2024. Exploiting side-channels in cybersecurity. Applied Informatics. 32, 3 (Sept. 2024). DOI:https://doi.org/10.31449/upinf.234.

Most read articles by the same author(s)