Analysing potential side-channel leakage on an embedded device

AES, a widely used encryption technique, is used to safeguard sensitive data in a variety of applications. It is nevertheless susceptible to side-channel analysis (SCA) attacks, which try to take advantage of physical weaknesses in a cryptosystem by examining elements like time intervals, power usag...

Full description

Saved in:
Bibliographic Details
Main Author: Lau, Li Hao
Other Authors: Gwee Bah Hwee
Format: Final Year Project
Language:English
Published: Nanyang Technological University 2023
Subjects:
Online Access:https://hdl.handle.net/10356/167630
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-167630
record_format dspace
spelling sg-ntu-dr.10356-1676302023-07-07T17:53:08Z Analysing potential side-channel leakage on an embedded device Lau, Li Hao Gwee Bah Hwee School of Electrical and Electronic Engineering ebhgwee@ntu.edu.sg Engineering::Electrical and electronic engineering::Computer hardware, software and systems AES, a widely used encryption technique, is used to safeguard sensitive data in a variety of applications. It is nevertheless susceptible to side-channel analysis (SCA) attacks, which try to take advantage of physical weaknesses in a cryptosystem by examining elements like time intervals, power usage monitoring, and electromagnetic emissions. It was shown in previous studies that certain lightweight embedded systems could be attacked via SCA, thus in this study, we seek to determine if the cryptographic keys used in AES encryption on a lightweight operating system (OS) like the Raspberry Pi (RPi) OS, can be retrieved from any side-channel leakage. To see if SCA is possible, we restrict the plaintext to 16 bytes and go through the encryption process numerous times. The report includes a review of the literature, hardware and software configurations for the experimental procedures, implementation and analysis of the results, and a conclusion with suggestions for future research. It will reveal that the SCA methods used in this research were insufficient to retrieve the encryption key and potential factors which may be attributed to this result. The study's conclusions will contribute to making lightweight systems' AES encryption more secure. Bachelor of Engineering (Electrical and Electronic Engineering) 2023-05-31T05:39:39Z 2023-05-31T05:39:39Z 2023 Final Year Project (FYP) Lau, L. H. (2023). Analysing potential side-channel leakage on an embedded device. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/167630 https://hdl.handle.net/10356/167630 en application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Electrical and electronic engineering::Computer hardware, software and systems
spellingShingle Engineering::Electrical and electronic engineering::Computer hardware, software and systems
Lau, Li Hao
Analysing potential side-channel leakage on an embedded device
description AES, a widely used encryption technique, is used to safeguard sensitive data in a variety of applications. It is nevertheless susceptible to side-channel analysis (SCA) attacks, which try to take advantage of physical weaknesses in a cryptosystem by examining elements like time intervals, power usage monitoring, and electromagnetic emissions. It was shown in previous studies that certain lightweight embedded systems could be attacked via SCA, thus in this study, we seek to determine if the cryptographic keys used in AES encryption on a lightweight operating system (OS) like the Raspberry Pi (RPi) OS, can be retrieved from any side-channel leakage. To see if SCA is possible, we restrict the plaintext to 16 bytes and go through the encryption process numerous times. The report includes a review of the literature, hardware and software configurations for the experimental procedures, implementation and analysis of the results, and a conclusion with suggestions for future research. It will reveal that the SCA methods used in this research were insufficient to retrieve the encryption key and potential factors which may be attributed to this result. The study's conclusions will contribute to making lightweight systems' AES encryption more secure.
author2 Gwee Bah Hwee
author_facet Gwee Bah Hwee
Lau, Li Hao
format Final Year Project
author Lau, Li Hao
author_sort Lau, Li Hao
title Analysing potential side-channel leakage on an embedded device
title_short Analysing potential side-channel leakage on an embedded device
title_full Analysing potential side-channel leakage on an embedded device
title_fullStr Analysing potential side-channel leakage on an embedded device
title_full_unstemmed Analysing potential side-channel leakage on an embedded device
title_sort analysing potential side-channel leakage on an embedded device
publisher Nanyang Technological University
publishDate 2023
url https://hdl.handle.net/10356/167630
_version_ 1772825672734998528