Exploiting side-channels in cybersecurity

Authors

  • Tjaž Štok University of Ljubljana, Faculty of Computer and Information Science
  • Matevž Pesek University of Ljubljana, Faculty of Computer and Information Science

DOI:

https://doi.org/10.31449/upinf.234

Keywords:

cybersecurity, cryptography, cryptanalysis

Abstract

When implementing cryptographic primitives in software, we often resort to optimizing the software code in order to reduce additional computation time. Such decisions can have negative consequences on data leakage outside the implementation. Attackers can exploit the additional information generated by the execution of the software solution in a way that gives them additional insights into the operation of the program, the values calculated and access to the data itself. Insights can be gained in the form of execution time, memory access patterns, power consumption, and other seemingly unrelated system parameters. Such attacks are referred to as ``side-channel attacks''.

This paper presents several examples of such attacks and the magnitude of information leakage and how to protect against them. Time-based cryptanalysis, power-based cryptanalysis and its special variant -- video-based cryptanalysis -- and memory-based cryptanalysis are described. A simple timing cryptanalysis attack is used as an example to present the analysis process and the results before and after the implementation of the proposed mitigation.

Author Biographies

Tjaž Štok, University of Ljubljana, Faculty of Computer and Information Science

Tjaž Štok je študent na Fakulteti za računalništvo in informatiko Univerze v Ljubljani. Zanimajo ga področja razvoja programske opreme in kibernetske varnosti. Njegovi raziskovalni interesi zajemajo teorijo kriptografije in razvoja varne programske opreme.

Matevž Pesek, University of Ljubljana, Faculty of Computer and Information Science

Matevž Pesek je docent in raziskovalec na Fakulteti za računalništvo in informatiko Univerze v Ljubljani, kjer je diplomiral (2012) in doktoriral (2018). Od leta 2009 je član Laboratorija za računalniško grafiko in multimedije. Od leta 2024 izvaja predmet Varnost programov.

Published

2024-09-13

How to Cite

[1]
Štok, T. and Pesek, M. 2024. Exploiting side-channels in cybersecurity. Applied Informatics. (Sep. 2024). DOI:https://doi.org/10.31449/upinf.234.

Issue

Section

Review scientific articles

Most read articles by the same author(s)