National Repository of Grey Literature 22 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Experimental testbed for side channel analysis
Vidlařová, Pavla ; Martinásek, Zdeněk (referee) ; Gerlich, Tomáš (advisor)
This thesis deals with getting familiar with the problematics of side channels. Theoretical part is described by basic concepts, types of side-channels and some possible side-channel attacks. Main focus is put on power side channel, which is used in practical part of the work. Followed by description of power analysis - simple power analysis and differential power analysis. Last part is description of workplace and all its parts, in which measurement will be performed. The practical part deals with realization of the workplace, measurement of power side channels on implementation of AES algorithm. Follows processing and visualisation of the values with SIde Channel Analysis toolKit.
Attacks on Cryptographic Modules
Daněček, Petr ; Zeman, Václav (advisor)
The conventional way of cryptanalysis is based on the cryptographic algorithms weak points examine. The attack model of conventional cryptanalysis covers mathematical description of the cryptographic algorithm used. This model is not with the relation to the physical model implementation and the real environment. Cryptographic algorithms currently used in the combination with strong cipher keys are almost unbreakable and the conventional cryptanalysis is ineffective. The new way of cryptanalysis employs the side channels. The model of cryptanalysis using side channels is enhanced with physical revelation of module performing the cryptographic operations. This dissertation thesis deals with cryptographic module description and studies influence of side channels to the security of this module.
Smart Card side channels
Pospíšil, Karel ; Martinásek, Zdeněk (referee) ; Sobotka, Jiří (advisor)
The thesis is dealing with smart cards and describes the known types of side channel attacks. Smart card belongs into the group of the youngest and smartest cards. In the card body, made mostly from PVC, there is a chip inserted which contains a microprocessor.Side channel attacks are trying to use the leaking information from the physical implementation of the system while processing the cryptographic algorithm. The attacker is trying to use the leaking sensitive information because under certain circumstances it can be dependent on the input data. The theoretical part is devoted to description of smart cards, their types and their safety. It describes the classification of attacks on smart cards and includes the overview of selected cryptographic algorithms used in smart cards. It also describes selected physical and logical attacks and the most frequent side channel attacks. The thesis furthermore describes possibilities of measuring the voltage-current side channel. The practical part deals with used software and hardware. This section is devoted to the measurement of power specification of smart cards and to the analysis of processed information, using the oscilloscope and workstation with AD 622 card and Simulink development environment.
Hiding of current consumption
Hirš, David ; Gerlich, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
Power analysis presents the typical example of successful attacks against trusted cryptographic devices such as smart cards or embedded devices. Nowadays, the popularity of Internet of Things (IoT) is growing therefore, designers sould implement cryptographic algorithms with countermeasures in order to defend against these types of attacks. The bachelor's thesis focus on the implementation of ultra-lightweight block cipher PRESENT and execution of Simple power analysis and Differential power analysis to reveal the secret key. Power analysis is firstly performed on cipher PRESENT with no implemented countermeasures and the attack was successful. Then the countermeasures were implemented and there were no leakage about the secret key. The countermeasures are using the hardware randomization of FPGA boards.
Side channel attacks on chip cards
Matějka, Jiří ; Morský, Ondřej (referee) ; Martinásek, Zdeněk (advisor)
This master thesis deals about the issues of chip cards’ side channels. Side channels are new method in cryptanalysis. Unlike classical cryptanalysis, which looks for weaknesses of mathematical structure of algorithms, side channel’s analysis use weaknesses of physical implementation of these algorithms. First part describes chip cards, their usage a security. There is mentioned the issue of cryptographic algorithms and their implementation on smart cards. There are described well-known side channels and examples of their abuse. Practical part of this thesis is focused on a proposal of a laboratory task, which demonstrates power-based side channel attack on smart card. There is designed laboratory workplace for this task, software for measurement and analysis is implemented in development tool LabVIEW. In the last part is this attack realized, the target of this attack is a standard SIM card.
Optical side channel
Kolofík, Josef ; Mačák, Jaromír (referee) ; Martinásek, Zdeněk (advisor)
This thesis deals with the optical side channel and using a neural network as classifier of data. The first part deals with the basics of cryptography and attacks on the cryptographic module. The second part deals with methods of decapsulation the microcontroller, decapsulation technological processes and methods of detection of photons. The third part deals with the use of neural networks as the basis of recognition and data classification software. In conclusion, the thesis describes the procedure for creating this software, analyzes the source code and tests the functionality of this solution.
Side channels in cryptography
Budík, Lukáš ; Sobotka, Jiří (referee) ; Martinásek, Zdeněk (advisor)
This work deals with a problem called sidelong cannals in cryptografy. First part describes basic segmentation of cryptografy branch. In addition to this the document mentions some requirements for cryptology system from security angle. In another section basic algorithms and protocols are described which are used in cryptology. Main part of this work is aimed at sidelong cannals problem. Conclusion of this task demonstrates an attack by time-side canal to algorithm RSA.
Differential electromagnetic analysis
Novotný, Bohumil ; Člupek, Vlastimil (referee) ; Martinásek, Zdeněk (advisor)
This diploma thesis studies the theory side channels, simple and differential analysis, and types of attacks on the side channel, which may be run against the cryptographic system. The thesis explains the principles of side channel attack on a possible defense against them. The second part of the thesis describes experimental work created, its individual components and their functions. The findings builds custom solutions attack the electromagnetic side channel using electromagnetic probes and the workplace equipment developed for this task. The final part of the thesis is devoted to the description of the implemented algorithm, a description of measurement, measurement results and possible modifications of algorithms implemented in the microcontroller for full automation of the attack on the device, against which the attack was conducted.
Side-channel analysis
Novosadová, Tatiana ; Lieskovan, Tomáš (referee) ; Gerlich, Tomáš (advisor)
This thesis deals with an issue of side channels, elliptic curves and their implementation in algorithms. Theoretical part is aimed at describing the basic concepts and various possibilities of side-channel attacks, with a more detailed focus on power analysis. The second theoretical part is focused on describing methods of elliptic curves and different elliptic curves-based protocols. The practical part deals with implementation of such cryptosystem on smart card, using the experimental environment to measure power consumption and analysis of this consumption.
Cryptanalysis using neural networks
Budík, Lukáš ; Mačák, Jaromír (referee) ; Martinásek, Zdeněk (advisor)
This dissertation deals with analysis of current side canal by means of neural network. First part describes basis of cryptografy and dilemma of side canal. In the second part is theoretickly described neural network and correlative analysis. Third part describes practical analysis of calibres of current side canals by means of classifier which uses neural network in Matlab surrounding. This classifier is confronted with classifier which uses correlative analysis.

National Repository of Grey Literature : 22 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.