Essays about: "Side-Channel Attack"

Showing result 11 - 15 of 26 essays containing the words Side-Channel Attack.

  1. 11. Far Field EM Side-Channel Attack Based on Deep Learning with Automated Hyperparameter Tuning

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Keyi Liu; [2021]
    Keywords : Side-Channel Attack; Deep Learning; Far Field EM emission; Auto Hyperparameter Tuning; Auto-Keras; AES; Sidokanalattack; Machine Learning; Multilayer Perceptron; Hyperparameter Tuning; Bayesian Optimization; Auto-Keras; AES;

    Abstract : Side-channel attacks have become a realistic threat to the implementations of cryptographic algorithms. By analyzing the unintentional, side-channel leakage, the attacker is able to recover the secret of the target. Recently, a new type of side-channel leakage has been discovered, called far field EM emissions. READ MORE

  2. 12. Board and Chip Diversity in Deep Learning Side-Channel Attacks : On ATtiny85 Implementations Featuring Encryption and Communication

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Filip Björklund; Niklas Landin; [2021]
    Keywords : side-channel attack; deep learning; poweranalysis; ATtiny85; diversity; sidokanalsattack; djupinlärning; effektanalys; ATtiny85; mångfald;

    Abstract : Hardware security is an increasingly relevant topic because more and more systems and products are equipped with embedded microcontrollers. One type of threat against hardware security is attacks against encryption implementations in embedded hardware. READ MORE

  3. 13. Exploring Side-Channel Analysis Targeting FPGA Based RISC-V Architecture : Attempts at Performing Attacks in Preparation for Future PQC Algorithms

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Max Vilhelmson Näf; [2021]
    Keywords : Post-Quantum Cryptography; Field Programmable Gate Array; Neural Network; Learning With Errors Rounding; Key Encapsulation Mechanism; Post-Quantum Cryptography; Field Programmable Gate Array; Neural Network; Learning With Errors Rounding; Key Encapsulation Mechanism;

    Abstract : Many public-key cryptosystems currently in use are threatened by the possibility of large-scale quantum computers being built in the future. To counteract this, a process of developing quantum-resistant cryptographic algorithms is underway. This process also emphasizes the importance of protecting algorithms from Side-Channel Analysis (SCA). READ MORE

  4. 14. Power analysis on FPGA implementation of Classic McEliece

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Andreas Johansson; [2021]
    Keywords : Technology and Engineering;

    Abstract : In this work, the hardware implementation of Classic McEliece has been assessed for side-channel leakage through a power analysis. The official, unprotected, decryption procedure of Classic McEliece was implemented on a Xilinx Atix7 \acl{fpga} and incorporated into the \acl{cw} framework. READ MORE

  5. 15. Far Field Electromagnetic Side Channel Analysis of AES

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zihao Zhao; [2020]
    Keywords : Side-channel analysis; far-feild electromagnetic emission; AES;

    Abstract : Side-Channel Attacks (SCAs) have become a realistic threat to implementations of cryptographic algorithms. By utilizing the unintentionally leaked side-channel information during the execution of a cryptographic algorithm, it is possible to bypass the theoretical strength of the algorithm and extract its secret key. READ MORE