Side-channel attack analysis & application
Side-channel attacks generally take advantage of the fact there are information leakages in hardware that perform encryption processes such as the Advanced Encryption Standard (AES). In order to extract sensitive information, techniques such as Differential Power Analysis (DPA) or Correlation Power...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2022
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/163585 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-163585 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1635852023-07-07T18:57:14Z Side-channel attack analysis & application Ng, Kwan Xhen Gwee Bah Hwee School of Electrical and Electronic Engineering ebhgwee@ntu.edu.sg Engineering::Electrical and electronic engineering Side-channel attacks generally take advantage of the fact there are information leakages in hardware that perform encryption processes such as the Advanced Encryption Standard (AES). In order to extract sensitive information, techniques such as Differential Power Analysis (DPA) or Correlation Power Analysis (CPA) are used. These techniques allow the attacker to extract valuable information and uncover the key to breaking the encryption. In this report, we will study the use of ChipWhisperer, a low-cost open-source project that helps standardize the functions for breaking into such encryption. This project also aims to enhance the attacking process by creating a web app to allow users to interact through a more familiar browser interface to conduct side-channel attacks. Bachelor of Engineering (Electrical and Electronic Engineering) 2022-12-12T03:37:03Z 2022-12-12T03:37:03Z 2022 Final Year Project (FYP) Ng, K. X. (2022). Side-channel attack analysis & application. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/163585 https://hdl.handle.net/10356/163585 en application/pdf Nanyang Technological University |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Electrical and electronic engineering |
spellingShingle |
Engineering::Electrical and electronic engineering Ng, Kwan Xhen Side-channel attack analysis & application |
description |
Side-channel attacks generally take advantage of the fact there are information leakages in hardware that perform encryption processes such as the Advanced Encryption Standard (AES). In order to extract sensitive information, techniques such as Differential Power Analysis (DPA) or Correlation Power Analysis (CPA) are used. These techniques allow the attacker to extract valuable information and uncover the key to breaking the encryption. In this report, we will study the use of ChipWhisperer, a low-cost open-source project that helps standardize the functions for breaking into such encryption. This project also aims to enhance the attacking process by creating a web app to allow users to interact through a more familiar browser interface to conduct side-channel attacks. |
author2 |
Gwee Bah Hwee |
author_facet |
Gwee Bah Hwee Ng, Kwan Xhen |
format |
Final Year Project |
author |
Ng, Kwan Xhen |
author_sort |
Ng, Kwan Xhen |
title |
Side-channel attack analysis & application |
title_short |
Side-channel attack analysis & application |
title_full |
Side-channel attack analysis & application |
title_fullStr |
Side-channel attack analysis & application |
title_full_unstemmed |
Side-channel attack analysis & application |
title_sort |
side-channel attack analysis & application |
publisher |
Nanyang Technological University |
publishDate |
2022 |
url |
https://hdl.handle.net/10356/163585 |
_version_ |
1772826573032914944 |