National Repository of Grey Literature 25 records found  beginprevious21 - 25  jump to record: Search took 0.02 seconds. 
Non-profiling power analysis attacks
Máchal, Petr ; Fujdiak, Radek (referee) ; Martinásek, Zdeněk (advisor)
The work is mainly concerned with the possibilities of breaking the encryption algorithm AES with using of non-template attacks. In the introduction are listed techniques of differential analysis, which are using in the present, but for the sake of completeness is there mention about simple power analysis. In the next chapters are briefly described countermeasures against power analysis and further is described the AES algorithm. Most important parts are chapters where are described attack implementation on AES-128 through correlation power analysis and mutual information analysis. These attacks exploit power traces from www pages dedicated to book Power Analysis Attacks - Revealing the Secrets of Smartcards, http://DPAbook.org and especially to power traces from DPA Contest 4.2, http://www.dpacontest.org. In conclusion is comparison of methods based on the number of power traces needed for finding the key of secret message.
Classifiers of power patterns
Zapletal, Ondřej ; Člupek, Vlastimil (referee) ; Martinásek, Zdeněk (advisor)
Over the last several years side-channel analysis has emerged as a major threat to securing sensitive information in cryptographic devices. Several side-channels have been discovered and used to break implementations of all major cryptographic algorithms (AES, DES, RSA). This thesis is focused on power analysis attacks. A variety of power analysis methods has been developed to perform these attacks. These methods include simple power analysis (SPA), differential power analysis (DPA), template attacks, etc. This work provides comprehensive survey of mentioned methods and also investigates the application of a machine learning techniques in power analysis. The considered learning techniques are neural networks and support vector machines. The final part of this thesis is dedicated to implemenation of the attack against protected software AES implementation which is used in the DPA Contest.
Cryptanalysis of modern cryptographic devices
Fördős, András ; Člupek, Vlastimil (referee) ; Martinásek, Zdeněk (advisor)
The thesis focuses on power analysis of modern cryptographic modules. The first part contains a brief introduction to the topic of the power side channel and basic methods of analyzes. The text describes the process of comparison of modules and a short description of devices found. In the practical part two modules has been selected for the implementation of the encryption algorithm AES-128. The first module was the chip card Gemalto .NET v2 and the second one was the Raspberry Pi. A workplace has been created for these modules which allowed to measure the power consumption of the algorithm AES. Differential Power Analysis has been made using the captured results. In its conclusion the work presents the results in tables and samples of source codes. Graphs were made from the results captured on the Raspberry Pi and from the results of the Differential Power Analysis.
Side channel attacks on chip cards
Matějka, Jiří ; Morský, Ondřej (referee) ; Martinásek, Zdeněk (advisor)
This master thesis deals about the issues of chip cards’ side channels. Side channels are new method in cryptanalysis. Unlike classical cryptanalysis, which looks for weaknesses of mathematical structure of algorithms, side channel’s analysis use weaknesses of physical implementation of these algorithms. First part describes chip cards, their usage a security. There is mentioned the issue of cryptographic algorithms and their implementation on smart cards. There are described well-known side channels and examples of their abuse. Practical part of this thesis is focused on a proposal of a laboratory task, which demonstrates power-based side channel attack on smart card. There is designed laboratory workplace for this task, software for measurement and analysis is implemented in development tool LabVIEW. In the last part is this attack realized, the target of this attack is a standard SIM card.
New physical attacks and security of smart-card
Hrubý, Jaroslav
Power analysis is a successful cryptonalytic technique which extracts secret inforamtion from smart-card by analysing the power consumed during the execution of their internal programs. These attacks are particularly dangerous in financial applications in which users their smart-cards into teller machines which are owned and operated by potentially dishonest entities.

National Repository of Grey Literature : 25 records found   beginprevious21 - 25  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.