Analysing potential side-channel leakage on an embedded device

AES, a widely used encryption technique, is used to safeguard sensitive data in a variety of applications. It is nevertheless susceptible to side-channel analysis (SCA) attacks, which try to take advantage of physical weaknesses in a cryptosystem by examining elements like time intervals, power usag...

Full description

Saved in:
Bibliographic Details
Main Author: Lau, Li Hao
Other Authors: Gwee Bah Hwee
Format: Final Year Project
Language:English
Published: Nanyang Technological University 2023
Subjects:
Online Access:https://hdl.handle.net/10356/167630
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
Description
Summary:AES, a widely used encryption technique, is used to safeguard sensitive data in a variety of applications. It is nevertheless susceptible to side-channel analysis (SCA) attacks, which try to take advantage of physical weaknesses in a cryptosystem by examining elements like time intervals, power usage monitoring, and electromagnetic emissions. It was shown in previous studies that certain lightweight embedded systems could be attacked via SCA, thus in this study, we seek to determine if the cryptographic keys used in AES encryption on a lightweight operating system (OS) like the Raspberry Pi (RPi) OS, can be retrieved from any side-channel leakage. To see if SCA is possible, we restrict the plaintext to 16 bytes and go through the encryption process numerous times. The report includes a review of the literature, hardware and software configurations for the experimental procedures, implementation and analysis of the results, and a conclusion with suggestions for future research. It will reveal that the SCA methods used in this research were insufficient to retrieve the encryption key and potential factors which may be attributed to this result. The study's conclusions will contribute to making lightweight systems' AES encryption more secure.