National Repository of Grey Literature 7 records found  Search took 0.01 seconds. 
The new side channels in cryptography
Machů, Petr ; Stančík, Peter (referee) ; Martinásek, Zdeněk (advisor)
This thesis is focused on the side-channels in the cryptology. The main attention is paid to the side-channels, which allow an attack on a computer keyboard. Especially the acoustic side-channel is focused on. Through this channel are demonstrated two attacks on the keyboard. At first, the method of recognizing is described. The neural network was used for the recognition. Then, the demonstration attacks on the keyboard are described. The first demonstration is an attack in laboratory conditions and the other in terms of household conditions. The thesis describes two attacks from the record, through data recognition by neural networks to evaluate the actual demonstration of attack. The following describes the recommendations for disabling attack. The results are supplemented by graphs and discussed.
Experimental testbed for power side channel analysis
Gajdošík, Ester ; Martinásek, Zdeněk (referee) ; Gerlich, Tomáš (advisor)
This bachelor’s thesis focuses on the implementation of a Power side channel attack on three experimental workplaces with the implemented AES-128 encryption algorithm. For these purposes are used FPGA boards SAKURA G, SAKURA X and Chipwhisperer CW305. The theoretical part of the work is focused on the principles of side channel attacks, while the main emphasis is on power analysis and its two methods – simple (SPA) and differential (DPA). The aim of the practical part is to compare the waveforms obtained from workplaces using the TVLA (Test Vector Leakage Assessment) leakage detection methods.
Experimental testbed for power side channel analysis
Gajdošík, Ester ; Martinásek, Zdeněk (referee) ; Gerlich, Tomáš (advisor)
This bachelor’s thesis focuses on the implementation of a Power side channel attack on three experimental workplaces with the implemented AES-128 encryption algorithm. For these purposes are used FPGA boards SAKURA G, SAKURA X and Chipwhisperer CW305. The theoretical part of the work is focused on the principles of side channel attacks, while the main emphasis is on power analysis and its two methods – simple (SPA) and differential (DPA). The aim of the practical part is to compare the waveforms obtained from workplaces using the TVLA (Test Vector Leakage Assessment) leakage detection methods.
Side-channel cryptanalysis using deep learning methods
Matuška, Jakub ; Martinásek, Zdeněk (referee) ; Sikora, Pavel (advisor)
Cryptographic systems are getting unbreakable on paper. Therefore attacks on the implementations using side-channels are getting in front of others. Especially when neural networks (NN) got involved in this field. With deep learning, these attacks can recover secret keys even on implementations with countermeasures. Deep learning assisted sidechannel analysis (DL-SCA) dominated this field over the statistical methods. That is why it is important to understand its concepts. This thesis will showcase these methods and introduce some new tools regarding correlation power analysis (CPA) and the training of NNs. An attack on ASCAD dataset will take place and the proposed NN to conduct this attack will be evaluated against other models using proper metrics. Lastly, improvements to SITM (See-In-The-Middle) attack using deep learning are proposed and implemented in the console application.
Crytographic attacks on TLS protocol
Oupický, Jan ; Tůma, Jiří (advisor) ; Boháček, Milan (referee)
The aim of this work is to introduce the reader to the protocol TLS and a few selected attacks against the protocol. In the first part we will define the necessary cryptographic definitions used in the following chapters. In the second part we will briefly talk about the history of procotols TLS and SSL and then we will closely look into how they work. The last part is about the analysis of the chosen cryptographically interesting attacks (Padding oracle on CBC mode, POODLE, BEAST and CRIME) against protocols TLS and SSL. 1
Crytographic attacks on TLS protocol
Oupický, Jan ; Tůma, Jiří (advisor) ; Boháček, Milan (referee)
The aim of this work is to introduce the reader to the protocol TLS and a few selected attacks against the protocol. In the first part we will define the necessary cryptographic definitions used in the following chapters. In the second part we will briefly talk about the history of procotols TLS and SSL and then we will closely look into how they work. The last part is about the analysis of the chosen cryptographically interesting attacks (Padding oracle on CBC mode, POODLE, BEAST and CRIME) against protocols TLS and SSL. 1
The new side channels in cryptography
Machů, Petr ; Stančík, Peter (referee) ; Martinásek, Zdeněk (advisor)
This thesis is focused on the side-channels in the cryptology. The main attention is paid to the side-channels, which allow an attack on a computer keyboard. Especially the acoustic side-channel is focused on. Through this channel are demonstrated two attacks on the keyboard. At first, the method of recognizing is described. The neural network was used for the recognition. Then, the demonstration attacks on the keyboard are described. The first demonstration is an attack in laboratory conditions and the other in terms of household conditions. The thesis describes two attacks from the record, through data recognition by neural networks to evaluate the actual demonstration of attack. The following describes the recommendations for disabling attack. The results are supplemented by graphs and discussed.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.