Methodology of power analysis attack

Power Analysis Attacks (PAA) are side-channel attacks (SCA) launched by cyber attackers to obtain information from cryptography devices. These information are normally highly confidential and therefore studies in protecting cryptography against PAA has become immensely important. There are two...

Full description

Saved in:
Bibliographic Details
Main Author: Toh, Zhen Hui
Other Authors: Gwee Bah Hwee
Format: Final Year Project
Language:English
Published: 2016
Subjects:
Online Access:http://hdl.handle.net/10356/67936
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-67936
record_format dspace
spelling sg-ntu-dr.10356-679362023-07-07T16:17:46Z Methodology of power analysis attack Toh, Zhen Hui Gwee Bah Hwee School of Electrical and Electronic Engineering DRNTU::Engineering Power Analysis Attacks (PAA) are side-channel attacks (SCA) launched by cyber attackers to obtain information from cryptography devices. These information are normally highly confidential and therefore studies in protecting cryptography against PAA has become immensely important. There are two types of attacks in Power Analysis Attacks, namely the simple power analysis attacks and the differential power analysis attack. In this paper, we will be mainly targeting on differential power analysis attack. The Differential Power Analysis Attack also known as DPA Attack targets on the correlation between the power dissipation of the cryptography device and the secret key. Hence given enough amount of time and information on the power dissipation spectrum of the cryptography device, the attacker can easily deduce what is the secret key. In this report, we will be discussing on three main topics such as Cryptography, Power Analysis Attack and lastly its Countermeasures. The focus will be put on the Hiding techniques of the countermeasure particularly the Dual Rail Precharge Logic Style. The main contribution of this report is to attack different types of logic style such as Precharge Static Logic, Sense Amplifier Based Logic, and Wave Dynamic Differential Logic implemented in part of AES cryptography algorithm (XOR and SBOX operation). The attacks were done basically to observe the cryptography power dissipation of all three cases and analyze the effectiveness of each individual logic implementation resilience against the attacks. Bachelor of Engineering 2016-05-23T07:40:44Z 2016-05-23T07:40:44Z 2016 Final Year Project (FYP) http://hdl.handle.net/10356/67936 en Nanyang Technological University 102 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering
spellingShingle DRNTU::Engineering
Toh, Zhen Hui
Methodology of power analysis attack
description Power Analysis Attacks (PAA) are side-channel attacks (SCA) launched by cyber attackers to obtain information from cryptography devices. These information are normally highly confidential and therefore studies in protecting cryptography against PAA has become immensely important. There are two types of attacks in Power Analysis Attacks, namely the simple power analysis attacks and the differential power analysis attack. In this paper, we will be mainly targeting on differential power analysis attack. The Differential Power Analysis Attack also known as DPA Attack targets on the correlation between the power dissipation of the cryptography device and the secret key. Hence given enough amount of time and information on the power dissipation spectrum of the cryptography device, the attacker can easily deduce what is the secret key. In this report, we will be discussing on three main topics such as Cryptography, Power Analysis Attack and lastly its Countermeasures. The focus will be put on the Hiding techniques of the countermeasure particularly the Dual Rail Precharge Logic Style. The main contribution of this report is to attack different types of logic style such as Precharge Static Logic, Sense Amplifier Based Logic, and Wave Dynamic Differential Logic implemented in part of AES cryptography algorithm (XOR and SBOX operation). The attacks were done basically to observe the cryptography power dissipation of all three cases and analyze the effectiveness of each individual logic implementation resilience against the attacks.
author2 Gwee Bah Hwee
author_facet Gwee Bah Hwee
Toh, Zhen Hui
format Final Year Project
author Toh, Zhen Hui
author_sort Toh, Zhen Hui
title Methodology of power analysis attack
title_short Methodology of power analysis attack
title_full Methodology of power analysis attack
title_fullStr Methodology of power analysis attack
title_full_unstemmed Methodology of power analysis attack
title_sort methodology of power analysis attack
publishDate 2016
url http://hdl.handle.net/10356/67936
_version_ 1772828523801608192