Essays about: "Side-Channel Attack"
Showing result 16 - 20 of 26 essays containing the words Side-Channel Attack.
-
16. Deep Learning Based Side-Channel Analysis of AES Based on Far Field Electromagnetic Radiation
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Advanced Encryption Standard (AES) is a widely accepted encryption algorithm used in Internet-of-Things (IoT) devices such as Bluetooth devices. Although the implementation of AES is complicated enough, attackers can still acquire the cryptographic information generated from the AES execution to perform Side-Channel Attack (SCA). READ MORE
-
17. Randomly perturbing the bytecode of white box cryptography implementations in an attempt to mitigate side-channel attacks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This study takes one step further towards constructing a tool able to automatically amplify the security on your cryptographic implementations. In white box cryptography the encryption key is hidden inside the encryption algorithm out of plain sight. READ MORE
-
18. Deep-Learning Side-Channel Attacks on AES
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Nyligen har stora framsteg gjorts i att tillämpa djupinlärning på sidokanalat- tacker. Detta medför ett hot mot säkerheten för implementationer av kryp- tografiska algoritmer. Konceptuellt är tanken att övervaka ett chip medan det kör kryptering för informationsläckage av ett visst slag, t.ex. READ MORE
-
19. Side-Channel Analysis of AES Based on Deep Learning
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Side-channel attacks avoid complex analysis of cryptographic algorithms, instead they use side-channel signals captured from a software or a hardware implementation of the algorithm to recover its secret key. Recently, deep learning models, especially Convolutional Neural Networks (CNN), have been shown successful in assisting side-channel analysis. READ MORE
-
20. Evaluating Compromising Emanations in Touchscreens
University essay from Linköpings universitet/InformationskodningAbstract : In a short time touchscreens has become one of the most used methods for input to smartphones and other machines such as cash registers, card terminals and ATMs. While the technology change was quick it introduces the possibility of new security holes. Compromising emanations is a possible security hole in almost all electronic equipment. READ MORE