Electromagnetic side-channel attack on intel FPGA

With the increasing number of devices relying on cryptography to protect sensitive information, the risk of side-channel attacks (SCA) is also on the rise. SCAs exploit the variations in the physical implementation of cryptographic algorithms to extract sensitive information, including the secret ke...

Full description

Saved in:
Bibliographic Details
Main Author: Teo, Yu Han
Other Authors: Gwee Bah Hwee
Format: Final Year Project
Language:English
Published: Nanyang Technological University 2023
Subjects:
Online Access:https://hdl.handle.net/10356/167522
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
Description
Summary:With the increasing number of devices relying on cryptography to protect sensitive information, the risk of side-channel attacks (SCA) is also on the rise. SCAs exploit the variations in the physical implementation of cryptographic algorithms to extract sensitive information, including the secret key. I n this project, we explore the vulnerabilities of the MAX 10 FPGA to side-channel attacks (SCAs). Specifically, we focus on the Last Round Hamming Distance attack, which exploits the electromagnetic radiation emitted during the encryption process to infer information about the secret key. We successfully perform an SCA on the MAX 10 FPGA and recover the secret key, demonstrating the effectiveness of this attack on this device.