National Repository of Grey Literature 4 records found  Search took 0.00 seconds. 
Hiding of current consumption
Hirš, David ; Gerlich, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
Power analysis presents the typical example of successful attacks against trusted cryptographic devices such as smart cards or embedded devices. Nowadays, the popularity of Internet of Things (IoT) is growing therefore, designers sould implement cryptographic algorithms with countermeasures in order to defend against these types of attacks. The bachelor's thesis focus on the implementation of ultra-lightweight block cipher PRESENT and execution of Simple power analysis and Differential power analysis to reveal the secret key. Power analysis is firstly performed on cipher PRESENT with no implemented countermeasures and the attack was successful. Then the countermeasures were implemented and there were no leakage about the secret key. The countermeasures are using the hardware randomization of FPGA boards.
Custom Intellectual Property Block For Lblock Cipher
Jedlička, Jakub
This paper presents the implementation of a lightweight cryptographic cipher for a hardware-constrained device. Describes the basic problems of lightweight cryptography on the field programmablegate array (FPGA) and its one representative cipher LBlock. Furthermore deals with theimplementation of the LBlock cipher in a very high speed integrated circuit hardware description language(VHDL) on the FPGA. The LBlock cipher is used with a custom advanced extensible interface(AXI) wrapper for the creation of a custom intellectual property (IP) block. This IP block will be usedto cipher files on the development board ZYBO Z7-20 powered by Zynq-7000. The final part of thepaper describes testing of the IP block with a defined set of the inputs and the outputs are validatedwith the correct outputs.
Power Analysis On Present Lightweight Cipher And Hw Countermeasure
Hirš, David
Power analysis presents the typical example of successful attacks against trusted cryptographic devices such as smart cards or emebeded devices. Nowadays, the popularity of Internet of Things (IoT) is growing therefore, designers sould implement cryptographic algorithms with countermeasures in order to defend against these types of attacks. The article focus on the implementation of ultra-lightweight block cipher PRESENT that using the hardware randomization as a countermeasures technique.
Hiding of current consumption
Hirš, David ; Gerlich, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
Power analysis presents the typical example of successful attacks against trusted cryptographic devices such as smart cards or embedded devices. Nowadays, the popularity of Internet of Things (IoT) is growing therefore, designers sould implement cryptographic algorithms with countermeasures in order to defend against these types of attacks. The bachelor's thesis focus on the implementation of ultra-lightweight block cipher PRESENT and execution of Simple power analysis and Differential power analysis to reveal the secret key. Power analysis is firstly performed on cipher PRESENT with no implemented countermeasures and the attack was successful. Then the countermeasures were implemented and there were no leakage about the secret key. The countermeasures are using the hardware randomization of FPGA boards.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.