Essays about: "Side-Channel Attack"

Showing result 16 - 20 of 26 essays containing the words Side-Channel Attack.

  1. 16. Deep Learning Based Side-Channel Analysis of AES Based on Far Field Electromagnetic Radiation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ruize Wang; [2020]
    Keywords : Side-Channel Attacks; EM; Far-Field; Deep Learning;

    Abstract : Advanced Encryption Standard (AES) is a widely accepted encryption algorithm used in Internet-of-Things (IoT) devices such as Bluetooth devices. Although the implementation of AES is complicated enough, attackers can still acquire the cryptographic information generated from the AES execution to perform Side-Channel Attack (SCA). READ MORE

  2. 17. Randomly perturbing the bytecode of white box cryptography implementations in an attempt to mitigate side-channel attacks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexander Koski; [2020]
    Keywords : ;

    Abstract : This study takes one step further towards constructing a tool able to automatically amplify the security on your cryptographic implementations. In white box cryptography the encryption key is hidden inside the encryption algorithm out of plain sight. READ MORE

  3. 18. Deep-Learning Side-Channel Attacks on AES

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Martin Brisfors; Sebastian Forsmark; [2019]
    Keywords : AES; Machine Learning; Side Channel Attack; Encryption; AES; maskinlarning; sidokanalattack; kryptering;

    Abstract : Nyligen har stora framsteg gjorts i att tillämpa djupinlärning på sidokanalat- tacker. Detta medför ett hot mot säkerheten för implementationer av kryp- tografiska algoritmer. Konceptuellt är tanken att övervaka ett chip medan det kör kryptering för informationsläckage av ett visst slag, t.ex. READ MORE

  4. 19. Side-Channel Analysis of AES Based on Deep Learning

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Huanyu Wang; [2019]
    Keywords : Side-Channel Attack; Deep Learning; Convolutional Neural Network;

    Abstract : Side-channel attacks avoid complex analysis of cryptographic algorithms, instead they use side-channel signals captured from a software or a hardware implementation of the algorithm to recover its secret key. Recently, deep learning models, especially Convolutional Neural Networks (CNN), have been shown successful in assisting side-channel analysis. READ MORE

  5. 20. Evaluating Compromising Emanations in Touchscreens

    University essay from Linköpings universitet/Informationskodning

    Author : Joakim Lidstedt; [2019]
    Keywords : Compromising emanations; Tempest; Touchscreen; Van Eck phreaking; Conducted emanations; Radiated emanations; Information Security; IT Security; Röjande signaler; Pekskärm; Informationssäkerhet; IT-Säkerhet;

    Abstract : In a short time touchscreens has become one of the most used methods for input to smartphones and other machines such as cash registers, card terminals and ATMs. While the technology change was quick it introduces the possibility of new security holes. Compromising emanations is a possible security hole in almost all electronic equipment. READ MORE