Matteo Cattaneo
Evaluating a side-channel simulation tool against real power traces of cryptographic software.
Rel. Danilo Bazzanella, Matteo Bocchi. Politecnico di Torino, Master of science program in Computer Engineering, 2023
|
Preview |
PDF (Tesi_di_laurea)
- Thesis
Licence: Creative Commons Attribution Non-commercial No Derivatives. Download (11MB) | Preview |
Abstract
Side-channel attacks are a type of attack that involves the physical outputs of embedded devices while cryptographic operations are running on them to recover some secrets. In this work we refer to power analysis due to the exploitation of the power consumption. Studying it and using suitable techniques, it is possible to recover the secret key used for the encryption. The thesis aims to the comparison of the traces generated by an emulator and by a real device, evaluating if the emulator can be a valid alternative than the generation of real traces. The emulator is Rainbow while the real target is an ARM Cortex-M4 microcontroller with the help of NewAE Technology ChipWhisperer tool.
The comparison is based on the use of two AES implementations, one in C language and one in assembly, considering, for each of the analysis and implementation adopted, the difference between simulated and real
Publication type
URI
![]() |
Modify record (reserved for operators) |
