Narrow your search

Library

KU Leuven (2)

UGent (1)


Resource type

dissertation (3)


Language

English (2)

Dutch (1)


Year
From To Submit

2018 (2)

2013 (1)

Listing 1 - 3 of 3
Sort by

Dissertation
Emulating Analog Synthesizers by Digital Signal Processing: Design of the Synthesizer Engine and Characterization of the Sound

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Dissertation
Cryptography Secured Against Side-Channel Attacks
Authors: --- --- ---
Year: 2018 Publisher: Leuven KU Leuven. Faculty of Engineering Science

Loading...
Export citation

Choose an application

Bookmark

Abstract

Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These attacks exploit characteristics of hardware implementations to compromise cryptosystems more easily than promised by the cryptanalytic security.Two categories of side-channel attacks can be distinguished: side-channel analysis and fault attacks. The former attempts to retrieve sensitive information by passively observing data or operation dependent leakages in the power consumption or electromagnetic radiation. The latter, on the other hand, attempts to reveal secrets by actively injecting faults in the circuitry. More advanced attacks mix both methods, resulting in combined attacks.A numberof countermeasures have been proposed for both types of attacks.Threshold Implementations is a countermeasure against side-channel analysis. It provides provable security against differential power analysis in the presence of hardware glitches. It furthermore offers a smaller area and higher throughput than countermeasures with equal security.Thwarting fault attacks often rely on duplication of the cryptographic algorithm resulting in either a larger area or a longer execution time. Furthermore, redundancy is commonly added to the intermediate variables, resulting in a further increase of the area. In the constrained environments in which embedded cryptosystems are deployed,these overheads should be avoided.In this project, Threshold Implementations will be extended to achieve provable security against fault attacks and combined attacks. Care will be taken to design these with minimal overhead on the implementation cost. After verification of the security of the countermeasures on FPGAs, the introduced overhead will be determined precisely and its cost and effectiveness will be evaluated.

Keywords


Dissertation
A Framework for Fault Sensitivity Analysis

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Fault Sensitivity Analysis (FSA) attack is one of the fault-based attacks that can retrieve secret keys of a cryptography system by injecting different kinds of fault into the system, observing and analyzing the outcoming side-channel information. In this thesis, we study and compare the different type of physical attacks to find out the advantages and disadvantages of each attack method. Then we dig more into the FSA attack, looking into the principle, application and implementation of the attack method. Finally, we perform an FSA attack by injecting clock glitches during operation and apply this attack to the Sbox of Advanced Encryption Standard (AES). We complete the automation of profiling phase and successfully retrieve the key from the Sbox.

Keywords

Listing 1 - 3 of 3
Sort by