Matteo Cattaneo
Evaluating a side-channel simulation tool against real power traces of cryptographic software.
Rel. Danilo Bazzanella, Matteo Bocchi. Politecnico di Torino, Corso di laurea magistrale in Ingegneria Informatica (Computer Engineering), 2023
|
PDF (Tesi_di_laurea)
- Tesi
Licenza: Creative Commons Attribution Non-commercial No Derivatives. Download (11MB) | Preview |
Abstract: |
Side-channel attacks are a type of attack that involves the physical outputs of embedded devices while cryptographic operations are running on them to recover some secrets. In this work we refer to power analysis due to the exploitation of the power consumption. Studying it and using suitable techniques, it is possible to recover the secret key used for the encryption. The thesis aims to the comparison of the traces generated by an emulator and by a real device, evaluating if the emulator can be a valid alternative than the generation of real traces. The emulator is Rainbow while the real target is an ARM Cortex-M4 microcontroller with the help of NewAE Technology ChipWhisperer tool. The comparison is based on the use of two AES implementations, one in C language and one in assembly, considering, for each of the analysis and implementation adopted, the difference between simulated and real. The benefits and limitation of the emulator will be discussed highlighting some improvements and, in the end, some possible future works in order to continue what done here. |
---|---|
Relators: | Danilo Bazzanella, Matteo Bocchi |
Academic year: | 2022/23 |
Publication type: | Electronic |
Number of Pages: | 84 |
Subjects: | |
Corso di laurea: | Corso di laurea magistrale in Ingegneria Informatica (Computer Engineering) |
Classe di laurea: | New organization > Master science > LM-32 - COMPUTER SYSTEMS ENGINEERING |
Aziende collaboratrici: | STMicroelectronics |
URI: | http://webthesis.biblio.polito.it/id/eprint/26870 |
Modify record (reserved for operators) |