Improve the effectiveness of side channel attack: correlation-based power analysis in offline analysis

In the current world there a different types of encryption standard and the most commonly used is the Advanced Encryption Standard [2]. One of the most well-known and effective way of side channel attacks today is retrieving information which has been leaked through the power dissipated. Side channe...

Full description

Saved in:
Bibliographic Details
Main Author: Leo, Feng Yi
Other Authors: Gwee Bah Hwee
Format: Final Year Project
Language:English
Published: 2016
Subjects:
Online Access:http://hdl.handle.net/10356/68045
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-68045
record_format dspace
spelling sg-ntu-dr.10356-680452023-07-07T16:34:50Z Improve the effectiveness of side channel attack: correlation-based power analysis in offline analysis Leo, Feng Yi Gwee Bah Hwee School of Electrical and Electronic Engineering DRNTU::Engineering In the current world there a different types of encryption standard and the most commonly used is the Advanced Encryption Standard [2]. One of the most well-known and effective way of side channel attacks today is retrieving information which has been leaked through the power dissipated. Side channel information can be retrieved from the encrypted device with the power dissipated and the Ciphertext that is available to the attacker. The power dissipated can be measured using an oscilloscope Differential Power Analysis attack is one of the more commonly used attack compared to Simple Power Analysis attack. In this report of mine, I will be presenting on the Cryptography (which consist of Advanced Encryption Standards), Differential Power Analysis attack, Countermeasures towards the attacks, my methodology as well as my results and findings of my project. To attack the encrypted device, attackers use software platform that they develop to decrypt the Ciphertext to obtain the correct key. With the correct key, the attacker can reveal secret information from the device. Such software platforms could be developed using programming development platforms such as MATLAB, Java, Python and Microsoft Visual Studio. I will also be presenting on the methods on how I develop a SCA platform to reveal the key of the smartcards or cryptographic devices using Microsoft Visual Studio Programming Language C# and compare it with other SCA platform such as MATLAB which other attackers had developed. Bachelor of Engineering 2016-05-24T03:54:25Z 2016-05-24T03:54:25Z 2016 Final Year Project (FYP) http://hdl.handle.net/10356/68045 en Nanyang Technological University 105 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering
spellingShingle DRNTU::Engineering
Leo, Feng Yi
Improve the effectiveness of side channel attack: correlation-based power analysis in offline analysis
description In the current world there a different types of encryption standard and the most commonly used is the Advanced Encryption Standard [2]. One of the most well-known and effective way of side channel attacks today is retrieving information which has been leaked through the power dissipated. Side channel information can be retrieved from the encrypted device with the power dissipated and the Ciphertext that is available to the attacker. The power dissipated can be measured using an oscilloscope Differential Power Analysis attack is one of the more commonly used attack compared to Simple Power Analysis attack. In this report of mine, I will be presenting on the Cryptography (which consist of Advanced Encryption Standards), Differential Power Analysis attack, Countermeasures towards the attacks, my methodology as well as my results and findings of my project. To attack the encrypted device, attackers use software platform that they develop to decrypt the Ciphertext to obtain the correct key. With the correct key, the attacker can reveal secret information from the device. Such software platforms could be developed using programming development platforms such as MATLAB, Java, Python and Microsoft Visual Studio. I will also be presenting on the methods on how I develop a SCA platform to reveal the key of the smartcards or cryptographic devices using Microsoft Visual Studio Programming Language C# and compare it with other SCA platform such as MATLAB which other attackers had developed.
author2 Gwee Bah Hwee
author_facet Gwee Bah Hwee
Leo, Feng Yi
format Final Year Project
author Leo, Feng Yi
author_sort Leo, Feng Yi
title Improve the effectiveness of side channel attack: correlation-based power analysis in offline analysis
title_short Improve the effectiveness of side channel attack: correlation-based power analysis in offline analysis
title_full Improve the effectiveness of side channel attack: correlation-based power analysis in offline analysis
title_fullStr Improve the effectiveness of side channel attack: correlation-based power analysis in offline analysis
title_full_unstemmed Improve the effectiveness of side channel attack: correlation-based power analysis in offline analysis
title_sort improve the effectiveness of side channel attack: correlation-based power analysis in offline analysis
publishDate 2016
url http://hdl.handle.net/10356/68045
_version_ 1772826249791537152