Analysing potential side-channel leakage on an embedded device
AES, a widely used encryption technique, is used to safeguard sensitive data in a variety of applications. It is nevertheless susceptible to side-channel analysis (SCA) attacks, which try to take advantage of physical weaknesses in a cryptosystem by examining elements like time intervals, power usag...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2023
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/167630 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-167630 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1676302023-07-07T17:53:08Z Analysing potential side-channel leakage on an embedded device Lau, Li Hao Gwee Bah Hwee School of Electrical and Electronic Engineering ebhgwee@ntu.edu.sg Engineering::Electrical and electronic engineering::Computer hardware, software and systems AES, a widely used encryption technique, is used to safeguard sensitive data in a variety of applications. It is nevertheless susceptible to side-channel analysis (SCA) attacks, which try to take advantage of physical weaknesses in a cryptosystem by examining elements like time intervals, power usage monitoring, and electromagnetic emissions. It was shown in previous studies that certain lightweight embedded systems could be attacked via SCA, thus in this study, we seek to determine if the cryptographic keys used in AES encryption on a lightweight operating system (OS) like the Raspberry Pi (RPi) OS, can be retrieved from any side-channel leakage. To see if SCA is possible, we restrict the plaintext to 16 bytes and go through the encryption process numerous times. The report includes a review of the literature, hardware and software configurations for the experimental procedures, implementation and analysis of the results, and a conclusion with suggestions for future research. It will reveal that the SCA methods used in this research were insufficient to retrieve the encryption key and potential factors which may be attributed to this result. The study's conclusions will contribute to making lightweight systems' AES encryption more secure. Bachelor of Engineering (Electrical and Electronic Engineering) 2023-05-31T05:39:39Z 2023-05-31T05:39:39Z 2023 Final Year Project (FYP) Lau, L. H. (2023). Analysing potential side-channel leakage on an embedded device. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/167630 https://hdl.handle.net/10356/167630 en application/pdf Nanyang Technological University |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Electrical and electronic engineering::Computer hardware, software and systems |
spellingShingle |
Engineering::Electrical and electronic engineering::Computer hardware, software and systems Lau, Li Hao Analysing potential side-channel leakage on an embedded device |
description |
AES, a widely used encryption technique, is used to safeguard sensitive data in a variety of applications. It is nevertheless susceptible to side-channel analysis (SCA) attacks, which try to take advantage of physical weaknesses in a cryptosystem by examining elements like time intervals, power usage monitoring, and electromagnetic emissions. It was shown in previous studies that certain lightweight embedded systems could be attacked via SCA, thus in this study, we seek to determine if the cryptographic keys used in AES encryption on a lightweight operating system (OS) like the Raspberry Pi (RPi) OS, can be retrieved from any side-channel leakage. To see if SCA is possible, we restrict the plaintext to 16 bytes and go through the encryption process numerous times.
The report includes a review of the literature, hardware and software configurations for the experimental procedures, implementation and analysis of the results, and a conclusion with suggestions for future research. It will reveal that the SCA methods used in this research were insufficient to retrieve the encryption key and potential factors which may be attributed to this result. The study's conclusions will contribute to making lightweight systems' AES encryption more secure. |
author2 |
Gwee Bah Hwee |
author_facet |
Gwee Bah Hwee Lau, Li Hao |
format |
Final Year Project |
author |
Lau, Li Hao |
author_sort |
Lau, Li Hao |
title |
Analysing potential side-channel leakage on an embedded device |
title_short |
Analysing potential side-channel leakage on an embedded device |
title_full |
Analysing potential side-channel leakage on an embedded device |
title_fullStr |
Analysing potential side-channel leakage on an embedded device |
title_full_unstemmed |
Analysing potential side-channel leakage on an embedded device |
title_sort |
analysing potential side-channel leakage on an embedded device |
publisher |
Nanyang Technological University |
publishDate |
2023 |
url |
https://hdl.handle.net/10356/167630 |
_version_ |
1772825672734998528 |