National Repository of Grey Literature 10 records found  Search took 0.01 seconds. 
Experimental testbed for side channel analysis
Vidlařová, Pavla ; Martinásek, Zdeněk (referee) ; Gerlich, Tomáš (advisor)
This thesis deals with getting familiar with the problematics of side channels. Theoretical part is described by basic concepts, types of side-channels and some possible side-channel attacks. Main focus is put on power side channel, which is used in practical part of the work. Followed by description of power analysis - simple power analysis and differential power analysis. Last part is description of workplace and all its parts, in which measurement will be performed. The practical part deals with realization of the workplace, measurement of power side channels on implementation of AES algorithm. Follows processing and visualisation of the values with SIde Channel Analysis toolKit.
Realization of differential power analysis
Marek, Pavel ; Dzurenda, Petr (referee) ; Martinásek, Zdeněk (advisor)
Nowadays, it is not enough to pay attention to encryption algorithm security from the mathematical aspect only. It is also necessary to pay attention to the implementation of encryption algorithm, because encryption devices can show plenty of information about implemented encryption via undesirable communication. This bachelor thesis deals with side channels issues (especially power side channel) and their use to obtain the secret key of AES encryption algorithm. For this purpose there are three operations realized in this thesis. At first, there is experimental workplace designed, which provides automatic saving of waveforms of encryption. Then there is a simple and differential power analysis of these waveforms performed. All parts are theoretically described in individual chapters. After theoretical description there is the practical part, which describes a proper realization of all tasks.
Side-channel analysis
Novosadová, Tatiana ; Lieskovan, Tomáš (referee) ; Gerlich, Tomáš (advisor)
This thesis deals with an issue of side channels, elliptic curves and their implementation in algorithms. Theoretical part is aimed at describing the basic concepts and various possibilities of side-channel attacks, with a more detailed focus on power analysis. The second theoretical part is focused on describing methods of elliptic curves and different elliptic curves-based protocols. The practical part deals with implementation of such cryptosystem on smart card, using the experimental environment to measure power consumption and analysis of this consumption.
Non-profiling power analysis attacks
Máchal, Petr ; Fujdiak, Radek (referee) ; Martinásek, Zdeněk (advisor)
The work is mainly concerned with the possibilities of breaking the encryption algorithm AES with using of non-template attacks. In the introduction are listed techniques of differential analysis, which are using in the present, but for the sake of completeness is there mention about simple power analysis. In the next chapters are briefly described countermeasures against power analysis and further is described the AES algorithm. Most important parts are chapters where are described attack implementation on AES-128 through correlation power analysis and mutual information analysis. These attacks exploit power traces from www pages dedicated to book Power Analysis Attacks - Revealing the Secrets of Smartcards, http://DPAbook.org and especially to power traces from DPA Contest 4.2, http://www.dpacontest.org. In conclusion is comparison of methods based on the number of power traces needed for finding the key of secret message.
Power analysis attack on masked AES implementation
Jakubíková, Radka ; Dzurenda, Petr (referee) ; Martinásek, Zdeněk (advisor)
The cryptographic algorithms are commonly used as a security item today. In some situations, the special device is used to run the cryptographic algorithm, so the data are protected against the attack from the internet. Naturally, the attack can be loaded on the device as well using the side channel attack. The data are under the great danger, because nowadays plenty of power consumption analyses exist. The side channel attack uses knowledge about the cryptographic algoritm and simple or differential analysis. The diploma thesis focuses on the differential power analysis attack for the data published under the DPA contest. This thesis covers different types of analyss and attacks, and describes the new DPACv4.2 implementation. The correlation analysis is presented for the DPACv4.2 and the possible attack is discussed at the conclusion.
Experimental testbed for side channel analysis
Vidlařová, Pavla ; Martinásek, Zdeněk (referee) ; Gerlich, Tomáš (advisor)
This thesis deals with getting familiar with the problematics of side channels. Theoretical part is described by basic concepts, types of side-channels and some possible side-channel attacks. Main focus is put on power side channel, which is used in practical part of the work. Followed by description of power analysis - simple power analysis and differential power analysis. Last part is description of workplace and all its parts, in which measurement will be performed. The practical part deals with realization of the workplace, measurement of power side channels on implementation of AES algorithm. Follows processing and visualisation of the values with SIde Channel Analysis toolKit.
Side-channel analysis
Novosadová, Tatiana ; Lieskovan, Tomáš (referee) ; Gerlich, Tomáš (advisor)
This thesis deals with an issue of side channels, elliptic curves and their implementation in algorithms. Theoretical part is aimed at describing the basic concepts and various possibilities of side-channel attacks, with a more detailed focus on power analysis. The second theoretical part is focused on describing methods of elliptic curves and different elliptic curves-based protocols. The practical part deals with implementation of such cryptosystem on smart card, using the experimental environment to measure power consumption and analysis of this consumption.
Realization of differential power analysis
Marek, Pavel ; Dzurenda, Petr (referee) ; Martinásek, Zdeněk (advisor)
Nowadays, it is not enough to pay attention to encryption algorithm security from the mathematical aspect only. It is also necessary to pay attention to the implementation of encryption algorithm, because encryption devices can show plenty of information about implemented encryption via undesirable communication. This bachelor thesis deals with side channels issues (especially power side channel) and their use to obtain the secret key of AES encryption algorithm. For this purpose there are three operations realized in this thesis. At first, there is experimental workplace designed, which provides automatic saving of waveforms of encryption. Then there is a simple and differential power analysis of these waveforms performed. All parts are theoretically described in individual chapters. After theoretical description there is the practical part, which describes a proper realization of all tasks.
Non-profiling power analysis attacks
Máchal, Petr ; Fujdiak, Radek (referee) ; Martinásek, Zdeněk (advisor)
The work is mainly concerned with the possibilities of breaking the encryption algorithm AES with using of non-template attacks. In the introduction are listed techniques of differential analysis, which are using in the present, but for the sake of completeness is there mention about simple power analysis. In the next chapters are briefly described countermeasures against power analysis and further is described the AES algorithm. Most important parts are chapters where are described attack implementation on AES-128 through correlation power analysis and mutual information analysis. These attacks exploit power traces from www pages dedicated to book Power Analysis Attacks - Revealing the Secrets of Smartcards, http://DPAbook.org and especially to power traces from DPA Contest 4.2, http://www.dpacontest.org. In conclusion is comparison of methods based on the number of power traces needed for finding the key of secret message.
Power analysis attack on masked AES implementation
Jakubíková, Radka ; Dzurenda, Petr (referee) ; Martinásek, Zdeněk (advisor)
The cryptographic algorithms are commonly used as a security item today. In some situations, the special device is used to run the cryptographic algorithm, so the data are protected against the attack from the internet. Naturally, the attack can be loaded on the device as well using the side channel attack. The data are under the great danger, because nowadays plenty of power consumption analyses exist. The side channel attack uses knowledge about the cryptographic algoritm and simple or differential analysis. The diploma thesis focuses on the differential power analysis attack for the data published under the DPA contest. This thesis covers different types of analyss and attacks, and describes the new DPACv4.2 implementation. The correlation analysis is presented for the DPACv4.2 and the possible attack is discussed at the conclusion.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.