Improve the effectiveness of side channel attack: correlation-based power analysis in offline analysis
In the current world there a different types of encryption standard and the most commonly used is the Advanced Encryption Standard [2]. One of the most well-known and effective way of side channel attacks today is retrieving information which has been leaked through the power dissipated. Side channe...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2016
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/68045 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-68045 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-680452023-07-07T16:34:50Z Improve the effectiveness of side channel attack: correlation-based power analysis in offline analysis Leo, Feng Yi Gwee Bah Hwee School of Electrical and Electronic Engineering DRNTU::Engineering In the current world there a different types of encryption standard and the most commonly used is the Advanced Encryption Standard [2]. One of the most well-known and effective way of side channel attacks today is retrieving information which has been leaked through the power dissipated. Side channel information can be retrieved from the encrypted device with the power dissipated and the Ciphertext that is available to the attacker. The power dissipated can be measured using an oscilloscope Differential Power Analysis attack is one of the more commonly used attack compared to Simple Power Analysis attack. In this report of mine, I will be presenting on the Cryptography (which consist of Advanced Encryption Standards), Differential Power Analysis attack, Countermeasures towards the attacks, my methodology as well as my results and findings of my project. To attack the encrypted device, attackers use software platform that they develop to decrypt the Ciphertext to obtain the correct key. With the correct key, the attacker can reveal secret information from the device. Such software platforms could be developed using programming development platforms such as MATLAB, Java, Python and Microsoft Visual Studio. I will also be presenting on the methods on how I develop a SCA platform to reveal the key of the smartcards or cryptographic devices using Microsoft Visual Studio Programming Language C# and compare it with other SCA platform such as MATLAB which other attackers had developed. Bachelor of Engineering 2016-05-24T03:54:25Z 2016-05-24T03:54:25Z 2016 Final Year Project (FYP) http://hdl.handle.net/10356/68045 en Nanyang Technological University 105 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering |
spellingShingle |
DRNTU::Engineering Leo, Feng Yi Improve the effectiveness of side channel attack: correlation-based power analysis in offline analysis |
description |
In the current world there a different types of encryption standard and the most commonly used is the Advanced Encryption Standard [2]. One of the most well-known and effective way of side channel attacks today is retrieving information which has been leaked through the power dissipated. Side channel information can be retrieved from the encrypted device with the power dissipated and the Ciphertext that is available to the attacker. The power dissipated can be measured using an oscilloscope
Differential Power Analysis attack is one of the more commonly used attack compared to Simple Power Analysis attack. In this report of mine, I will be presenting on the Cryptography (which consist of Advanced Encryption Standards), Differential Power Analysis attack, Countermeasures towards the attacks, my methodology as well as my results and findings of my project.
To attack the encrypted device, attackers use software platform that they develop to decrypt the Ciphertext to obtain the correct key. With the correct key, the attacker can reveal secret information from the device. Such software platforms could be developed using programming development platforms such as MATLAB, Java, Python and Microsoft Visual Studio.
I will also be presenting on the methods on how I develop a SCA platform to reveal the key of the smartcards or cryptographic devices using Microsoft Visual Studio Programming Language C# and compare it with other SCA platform such as MATLAB which other attackers had developed. |
author2 |
Gwee Bah Hwee |
author_facet |
Gwee Bah Hwee Leo, Feng Yi |
format |
Final Year Project |
author |
Leo, Feng Yi |
author_sort |
Leo, Feng Yi |
title |
Improve the effectiveness of side channel attack: correlation-based power analysis in offline analysis |
title_short |
Improve the effectiveness of side channel attack: correlation-based power analysis in offline analysis |
title_full |
Improve the effectiveness of side channel attack: correlation-based power analysis in offline analysis |
title_fullStr |
Improve the effectiveness of side channel attack: correlation-based power analysis in offline analysis |
title_full_unstemmed |
Improve the effectiveness of side channel attack: correlation-based power analysis in offline analysis |
title_sort |
improve the effectiveness of side channel attack: correlation-based power analysis in offline analysis |
publishDate |
2016 |
url |
http://hdl.handle.net/10356/68045 |
_version_ |
1772826249791537152 |