Essays about: "Side-Channel Attack"

Showing result 21 - 25 of 26 essays containing the words Side-Channel Attack.

  1. 21. Minimizing Side-Channel Attack Vulnerability via Schedule Randomization

    University essay from Lunds universitet/Institutionen för reglerteknik

    Author : Nils Vreman; [2018]
    Keywords : Technology and Engineering;

    Abstract : Predictable and repeatable execution is the key to ensuring functional correctness for real-time systems. Scheduling algorithms are designed to generate schedules that repeat after a certain amount of time has passed. However, this repeatability is also a vulnerability when side-channel attacks are considered. READ MORE

  2. 22. Electromagnetic analysis of AES-256 on Xilinx Artix-7

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Oskar Westman; [2018]
    Keywords : Electromagnetic side-channel attack; AES-256; Artix-7; FPGA; Differential analysis; Simple analysis.; Technology and Engineering;

    Abstract : In this project, an electromagnetic side-channel attack has been made by exploiting the information leakage from a field programmable gate array (FPGA) and an implemented advanced encryption standard with a 256-bit key (AES-256). The FPGA-board was a Nexys-4 from Digilent with Artix-7 FPGA. The attack was partially successful. READ MORE

  3. 23. On the Applicability of a Cache Side-Channel Attack on ECDSA Signatures : The Flush+Reload attack on the point multiplication in ECDSA signature generation process

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Sai Prashanth Josyula; [2015]
    Keywords : Digital signatures; Elliptic curve cryptography; GLV method; Side-channel attack;

    Abstract : Context. Digital counterparts of handwritten signatures are known as Digital Signatures. The Elliptic Curve Digital Signature Algorithm (ECDSA) is an Elliptic Curve Cryptography (ECC) primitive, which is used for generating and verifying digital signatures. READ MORE

  4. 24. Torminator: A Tor fingerprinting suite : Or how the Tor-network might get a surprise attack from the future. “I’ll be back” – The Terminator

    University essay from KTH/Kommunikationsnät

    Author : Petter Salminen; [2015]
    Keywords : ;

    Abstract : Tor is a very popular anonymisation software and network. For which we created Torminator, a fingerprinting suite written in the Java programming language. Fingerprinting is an attack type applicable to Tor utilising side-channel information from the network packets. READ MORE

  5. 25. Keyboard Acoustic Emanations Attack : An Empirical study

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Sravanthi Ponnam; [2013]
    Keywords : Keyboard acoustic emanations; Side channel attacks; Key logging;

    Abstract : The sounds produced from the keystrokes when a user types on the keyboard are called keyboard acoustic emanations. These sounds can be recorded with a microphone and stored as a file on the computer. Different techniques can be used to retrieve each keystroke. READ MORE