Essays about: "Far-Field Side-Channel Attacks"
Showing result 1 - 5 of 6 essays containing the words Far-Field Side-Channel Attacks.
-
1. Improving deep learning assistedfar-field electromagnetic sidechannelattacks on AES : Effects on attack efficiency from using additive noise and otherdata augmentation techniques
University essay from KTH/MekatronikAbstract : Profiled side-channel attacks on hardware implemented cryptographic algorithms have been a well-researched topic for the past two decades and many countermeasures against these attacks have been proposed and adopted by the industry. Recently, a new form of far field EM side channel called "screaming channel attacks" have been highlighted. READ MORE
-
2. An Efficiency Evaluation of Far-Field Electromagnetic Deep Learning Side-Channel Attacks in Controlled Environments
University essay from Uppsala universitet/Signaler och systemAbstract : As more and more modern systems and products use built-in microcontrollers, hardware security becomes more important to protect against cyber-attacks. Internet of things devices, like Bluetooth devices, usually use an encryption algorithm to keep data safe from hackers. Advanced Encryption Standard (AES) is a commonly used encryption algorithm. READ MORE
-
3. Far Field EM Side-Channel Attack Based on Deep Learning with Automated Hyperparameter Tuning
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Side-channel attacks have become a realistic threat to the implementations of cryptographic algorithms. By analyzing the unintentional, side-channel leakage, the attacker is able to recover the secret of the target. Recently, a new type of side-channel leakage has been discovered, called far field EM emissions. READ MORE
-
4. Using Correlation Analysis to Locate Encryption Activity in Electromagnetic Side-Channels
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Physical implementations of cryptographic algorithmscan leak sensitive information through different kindsof side-channels. This information can potentially be used forrecovering the secret key used in the algorithms. Recently, sidechannelattacks on CPU implementations of Advanced EncryptionStandard (AES) has been presented. READ MORE
-
5. Far Field Electromagnetic Side Channel Analysis of AES
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Side-Channel Attacks (SCAs) have become a realistic threat to implementations of cryptographic algorithms. By utilizing the unintentionally leaked side-channel information during the execution of a cryptographic algorithm, it is possible to bypass the theoretical strength of the algorithm and extract its secret key. READ MORE