Methodology of power analysis attack

Power Analysis Attacks (PAA) are side-channel attacks (SCA) launched by cyber attackers to obtain information from cryptography devices. These information are normally highly confidential and therefore studies in protecting cryptography against PAA has become immensely important. There are two...

Full description

Bibliographic Details
Main Author: Toh, Zhen Hui
Other Authors: Gwee Bah Hwee
Format: Final Year Project (FYP)
Language:English
Published: 2016
Subjects:
Online Access:http://hdl.handle.net/10356/67936
_version_ 1811697321709142016
author Toh, Zhen Hui
author2 Gwee Bah Hwee
author_facet Gwee Bah Hwee
Toh, Zhen Hui
author_sort Toh, Zhen Hui
collection NTU
description Power Analysis Attacks (PAA) are side-channel attacks (SCA) launched by cyber attackers to obtain information from cryptography devices. These information are normally highly confidential and therefore studies in protecting cryptography against PAA has become immensely important. There are two types of attacks in Power Analysis Attacks, namely the simple power analysis attacks and the differential power analysis attack. In this paper, we will be mainly targeting on differential power analysis attack. The Differential Power Analysis Attack also known as DPA Attack targets on the correlation between the power dissipation of the cryptography device and the secret key. Hence given enough amount of time and information on the power dissipation spectrum of the cryptography device, the attacker can easily deduce what is the secret key. In this report, we will be discussing on three main topics such as Cryptography, Power Analysis Attack and lastly its Countermeasures. The focus will be put on the Hiding techniques of the countermeasure particularly the Dual Rail Precharge Logic Style. The main contribution of this report is to attack different types of logic style such as Precharge Static Logic, Sense Amplifier Based Logic, and Wave Dynamic Differential Logic implemented in part of AES cryptography algorithm (XOR and SBOX operation). The attacks were done basically to observe the cryptography power dissipation of all three cases and analyze the effectiveness of each individual logic implementation resilience against the attacks.
first_indexed 2024-10-01T07:53:24Z
format Final Year Project (FYP)
id ntu-10356/67936
institution Nanyang Technological University
language English
last_indexed 2024-10-01T07:53:24Z
publishDate 2016
record_format dspace
spelling ntu-10356/679362023-07-07T16:17:46Z Methodology of power analysis attack Toh, Zhen Hui Gwee Bah Hwee School of Electrical and Electronic Engineering DRNTU::Engineering Power Analysis Attacks (PAA) are side-channel attacks (SCA) launched by cyber attackers to obtain information from cryptography devices. These information are normally highly confidential and therefore studies in protecting cryptography against PAA has become immensely important. There are two types of attacks in Power Analysis Attacks, namely the simple power analysis attacks and the differential power analysis attack. In this paper, we will be mainly targeting on differential power analysis attack. The Differential Power Analysis Attack also known as DPA Attack targets on the correlation between the power dissipation of the cryptography device and the secret key. Hence given enough amount of time and information on the power dissipation spectrum of the cryptography device, the attacker can easily deduce what is the secret key. In this report, we will be discussing on three main topics such as Cryptography, Power Analysis Attack and lastly its Countermeasures. The focus will be put on the Hiding techniques of the countermeasure particularly the Dual Rail Precharge Logic Style. The main contribution of this report is to attack different types of logic style such as Precharge Static Logic, Sense Amplifier Based Logic, and Wave Dynamic Differential Logic implemented in part of AES cryptography algorithm (XOR and SBOX operation). The attacks were done basically to observe the cryptography power dissipation of all three cases and analyze the effectiveness of each individual logic implementation resilience against the attacks. Bachelor of Engineering 2016-05-23T07:40:44Z 2016-05-23T07:40:44Z 2016 Final Year Project (FYP) http://hdl.handle.net/10356/67936 en Nanyang Technological University 102 p. application/pdf
spellingShingle DRNTU::Engineering
Toh, Zhen Hui
Methodology of power analysis attack
title Methodology of power analysis attack
title_full Methodology of power analysis attack
title_fullStr Methodology of power analysis attack
title_full_unstemmed Methodology of power analysis attack
title_short Methodology of power analysis attack
title_sort methodology of power analysis attack
topic DRNTU::Engineering
url http://hdl.handle.net/10356/67936
work_keys_str_mv AT tohzhenhui methodologyofpoweranalysisattack