Side-channel attack analysis & application

Side-channel attacks generally take advantage of the fact there are information leakages in hardware that perform encryption processes such as the Advanced Encryption Standard (AES). In order to extract sensitive information, techniques such as Differential Power Analysis (DPA) or Correlation Power...

全面介紹

Saved in:
書目詳細資料
主要作者: Ng, Kwan Xhen
其他作者: Gwee Bah Hwee
格式: Final Year Project
語言:English
出版: Nanyang Technological University 2022
主題:
在線閱讀:https://hdl.handle.net/10356/163585
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
實物特徵
總結:Side-channel attacks generally take advantage of the fact there are information leakages in hardware that perform encryption processes such as the Advanced Encryption Standard (AES). In order to extract sensitive information, techniques such as Differential Power Analysis (DPA) or Correlation Power Analysis (CPA) are used. These techniques allow the attacker to extract valuable information and uncover the key to breaking the encryption. In this report, we will study the use of ChipWhisperer, a low-cost open-source project that helps standardize the functions for breaking into such encryption. This project also aims to enhance the attacking process by creating a web app to allow users to interact through a more familiar browser interface to conduct side-channel attacks.