Security analysis of stored contents in memory chip
The chip on smart cards stores sensitive information. An example of a smart card would be credit cards which stores data for the purpose of authentication and authorization when a transaction is made. Therefore, the chip should be secured to ensure that the data is protected from attackers. This...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/77566 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-77566 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-775662023-07-07T16:28:58Z Security analysis of stored contents in memory chip Muhammad Afiq Sasman Gwee Bah Hwee School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering::Integrated circuits The chip on smart cards stores sensitive information. An example of a smart card would be credit cards which stores data for the purpose of authentication and authorization when a transaction is made. Therefore, the chip should be secured to ensure that the data is protected from attackers. This project focuses primarily on hardware security. Side Channel Attack (SCA) in general is an attack on a device based on the data obtained from unintentional physical leaks. The objective of this project is to obtain the encryption keys from 2 smart cards via SCA. The power traces of the smart cards performing AES-128 encryption were recorded and analysed. The power traces were put through different power models and analysed at different points of the traces. The project has successfully obtained 16 out of 16 encryption keys from the AT Mega Card and 4 out of 16 keys from the UL Smart Card. Bachelor of Engineering (Electrical and Electronic Engineering) 2019-05-31T06:46:37Z 2019-05-31T06:46:37Z 2019 Final Year Project (FYP) http://hdl.handle.net/10356/77566 en Nanyang Technological University 68 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Electrical and electronic engineering::Integrated circuits |
spellingShingle |
DRNTU::Engineering::Electrical and electronic engineering::Integrated circuits Muhammad Afiq Sasman Security analysis of stored contents in memory chip |
description |
The chip on smart cards stores sensitive information. An example of a smart card
would be credit cards which stores data for the purpose of authentication and
authorization when a transaction is made. Therefore, the chip should be secured to
ensure that the data is protected from attackers. This project focuses primarily on
hardware security. Side Channel Attack (SCA) in general is an attack on a device
based on the data obtained from unintentional physical leaks. The objective of this
project is to obtain the encryption keys from 2 smart cards via SCA. The power traces of the smart cards performing AES-128 encryption were recorded and analysed. The power traces were put through different power models and analysed at different points of the traces. The project has successfully obtained 16 out of 16 encryption keys from the AT Mega Card and 4 out of 16 keys from the UL Smart Card. |
author2 |
Gwee Bah Hwee |
author_facet |
Gwee Bah Hwee Muhammad Afiq Sasman |
format |
Final Year Project |
author |
Muhammad Afiq Sasman |
author_sort |
Muhammad Afiq Sasman |
title |
Security analysis of stored contents in memory chip |
title_short |
Security analysis of stored contents in memory chip |
title_full |
Security analysis of stored contents in memory chip |
title_fullStr |
Security analysis of stored contents in memory chip |
title_full_unstemmed |
Security analysis of stored contents in memory chip |
title_sort |
security analysis of stored contents in memory chip |
publishDate |
2019 |
url |
http://hdl.handle.net/10356/77566 |
_version_ |
1772828348522692608 |