Improve the effectiveness of side channel attack: correlation-based power analysis in offline analysis

In the current world there a different types of encryption standard and the most commonly used is the Advanced Encryption Standard [2]. One of the most well-known and effective way of side channel attacks today is retrieving information which has been leaked through the power dissipated. Side channe...

Full description

Bibliographic Details
Main Author: Leo, Feng Yi
Other Authors: Gwee Bah Hwee
Format: Final Year Project (FYP)
Language:English
Published: 2016
Subjects:
Online Access:http://hdl.handle.net/10356/68045
Description
Summary:In the current world there a different types of encryption standard and the most commonly used is the Advanced Encryption Standard [2]. One of the most well-known and effective way of side channel attacks today is retrieving information which has been leaked through the power dissipated. Side channel information can be retrieved from the encrypted device with the power dissipated and the Ciphertext that is available to the attacker. The power dissipated can be measured using an oscilloscope Differential Power Analysis attack is one of the more commonly used attack compared to Simple Power Analysis attack. In this report of mine, I will be presenting on the Cryptography (which consist of Advanced Encryption Standards), Differential Power Analysis attack, Countermeasures towards the attacks, my methodology as well as my results and findings of my project. To attack the encrypted device, attackers use software platform that they develop to decrypt the Ciphertext to obtain the correct key. With the correct key, the attacker can reveal secret information from the device. Such software platforms could be developed using programming development platforms such as MATLAB, Java, Python and Microsoft Visual Studio. I will also be presenting on the methods on how I develop a SCA platform to reveal the key of the smartcards or cryptographic devices using Microsoft Visual Studio Programming Language C# and compare it with other SCA platform such as MATLAB which other attackers had developed.