National Repository of Grey Literature 14 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
Power side channel
Zapletal, Ondřej ; Mácha, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
This thesis deals with side-channel cryptoanalysis. It is focused on power side-channel attack on cryptographic device. The microcontroller PIC is used as the cryptographic device. This microcontroller performs encryption through the symmetrical algorithm AES. For the purpose of simple and differential power analysis, we designed and constructed an experimental printed circuit board. The power consumption of the microcontroller PIC working with instruction AddRoundKey and SubBytes was scanned by a Tektronix CT-6 current probe. Data obtained by measuring were processed on the computer with relevant software and provided important information about the encryption key that was used.
Modern cryptanalysis
Petřík, Tomáš ; Morávek, Patrik (referee) ; Martinásek, Zdeněk (advisor)
Issues of this thesis are focused on side-channel cryptanalysis. Particularly attention is paid to differential power analysis, when is simulated an attack on the cryptographic module for different conditions and for different structural features of this module. As the cryptographic module is used a PIC microcontroller, which is operating with AES symmetric encryption algorithm. For this purpose, a design of experimental printed circuit board was created. Then, this PCB was equipped only with the necessary components for the function of the cryptographic module. Cryptanalysis is aimed on current consumption of crypto module that is caused by execution of AddRoundKey instructions. Power consumption of PIC microcontroller is measured in depending on the size of power supply voltage, size of serial resistor, size of bypass capacitor, and this thesis also examines the influence of ambient temperature on power consumption of PIC. The measured values are graphically presented and then discussed.
Realization of differential power analysis
Marek, Pavel ; Dzurenda, Petr (referee) ; Martinásek, Zdeněk (advisor)
Nowadays, it is not enough to pay attention to encryption algorithm security from the mathematical aspect only. It is also necessary to pay attention to the implementation of encryption algorithm, because encryption devices can show plenty of information about implemented encryption via undesirable communication. This bachelor thesis deals with side channels issues (especially power side channel) and their use to obtain the secret key of AES encryption algorithm. For this purpose there are three operations realized in this thesis. At first, there is experimental workplace designed, which provides automatic saving of waveforms of encryption. Then there is a simple and differential power analysis of these waveforms performed. All parts are theoretically described in individual chapters. After theoretical description there is the practical part, which describes a proper realization of all tasks.
Side Channel Cryptanalysis
Martinásek, Zdeněk ; Vaněk, Tomáš (referee) ; Dočkal,, Jaromír (referee) ; Zeman, Václav (advisor)
Side channels fundamentally changes the view of the cryptographic system security in cryptography. It is not enough to analyze the security algorithm only from a mathematical point of view using abstract models but it is necessary to focus on the implementation of the algorithms. The introduction of the thesis deals with the basic terms, principles of side channel attacks and basic clasification of side channels. The following chapter describes the objectives of the thesis. The main goal of the thesis is to propose and experimentally verify a new power analysis method whish will use the neural network. This main goal was based on the realized analyzes presented in the following chapters. These chapters contain a detailed analysis of currently used power analysis and analysis of AES encryption algorithm. AES was selected becouse the algorithm is resistant to the conventional cryptoanalysis. The following section describes the experimental results of the optimization of existing methods, the influence of the parameters affecting power consumption and the results of the proposed analysis using neural networks. This section includes the discussion of the results. This type of side channel attack has not been published yet thus it is a completely new idea. The final goal of the thesis was to summarize the possible countermeasures protecting against the side channel attacks.
Side current channel of microprocessors
Obručník, Ondřej ; Hanák, Pavel (referee) ; Martinásek, Zdeněk (advisor)
In this masters's thesis is closely studied questins of current (power) side channel. It deals with attack upon this type of side channels and methods, which can this channel analyse. Also two methods of measurements, which make possible successfully attack, are presented here. Below the work describes progress, which was used for analyse current side channel of chip PIC16F84A. This chip, which was plugged in the circuit in agreement with diagram introduced here, processes step by step variety of programs implementing always other operation, which matches concrete used instruction. In corresponding chapters are introduced resulting values and graphs, which was obtained by measurement.
Non-profiling power analysis attacks
Máchal, Petr ; Fujdiak, Radek (referee) ; Martinásek, Zdeněk (advisor)
The work is mainly concerned with the possibilities of breaking the encryption algorithm AES with using of non-template attacks. In the introduction are listed techniques of differential analysis, which are using in the present, but for the sake of completeness is there mention about simple power analysis. In the next chapters are briefly described countermeasures against power analysis and further is described the AES algorithm. Most important parts are chapters where are described attack implementation on AES-128 through correlation power analysis and mutual information analysis. These attacks exploit power traces from www pages dedicated to book Power Analysis Attacks - Revealing the Secrets of Smartcards, http://DPAbook.org and especially to power traces from DPA Contest 4.2, http://www.dpacontest.org. In conclusion is comparison of methods based on the number of power traces needed for finding the key of secret message.
Side channels - preparation of lab task
Holemář, Jan ; Malina, Lukáš (referee) ; Martinásek, Zdeněk (advisor)
This thesis deals with side-channel cryptoanalysis. It is focused on power side-channel attack on cryptographic device. The smart card Gemalto .NET is used as the cryptographic device. This smart card performs encryption through algorithm RSA, DES, AES. The power consumption of the smart card was scanned by a Tektronix CT-6 current probe. Data obtained by measuring were processed on the computer with relevant software and provided important information about the encryption key that was used.
Realization of differential power analysis
Marek, Pavel ; Dzurenda, Petr (referee) ; Martinásek, Zdeněk (advisor)
Nowadays, it is not enough to pay attention to encryption algorithm security from the mathematical aspect only. It is also necessary to pay attention to the implementation of encryption algorithm, because encryption devices can show plenty of information about implemented encryption via undesirable communication. This bachelor thesis deals with side channels issues (especially power side channel) and their use to obtain the secret key of AES encryption algorithm. For this purpose there are three operations realized in this thesis. At first, there is experimental workplace designed, which provides automatic saving of waveforms of encryption. Then there is a simple and differential power analysis of these waveforms performed. All parts are theoretically described in individual chapters. After theoretical description there is the practical part, which describes a proper realization of all tasks.
Side channels - preparation of lab task
Holemář, Jan ; Malina, Lukáš (referee) ; Martinásek, Zdeněk (advisor)
This thesis deals with side-channel cryptoanalysis. It is focused on power side-channel attack on cryptographic device. The smart card Gemalto .NET is used as the cryptographic device. This smart card performs encryption through algorithm RSA, DES, AES. The power consumption of the smart card was scanned by a Tektronix CT-6 current probe. Data obtained by measuring were processed on the computer with relevant software and provided important information about the encryption key that was used.
Power side channel
Zapletal, Ondřej ; Mácha, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
This thesis deals with side-channel cryptoanalysis. It is focused on power side-channel attack on cryptographic device. The microcontroller PIC is used as the cryptographic device. This microcontroller performs encryption through the symmetrical algorithm AES. For the purpose of simple and differential power analysis, we designed and constructed an experimental printed circuit board. The power consumption of the microcontroller PIC working with instruction AddRoundKey and SubBytes was scanned by a Tektronix CT-6 current probe. Data obtained by measuring were processed on the computer with relevant software and provided important information about the encryption key that was used.

National Repository of Grey Literature : 14 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.