View Item 
      •   Home
      • 1. Schools
      • College of Engineering
      • School of Electrical and Electronic Engineering (EEE)
      • EEE Student Reports (FYP/IA/PA/PI)
      • View Item
      •   Home
      • 1. Schools
      • College of Engineering
      • School of Electrical and Electronic Engineering (EEE)
      • EEE Student Reports (FYP/IA/PA/PI)
      • View Item
      JavaScript is disabled for your browser. Some features of this site may not work without it.
      Subject Lookup

      Browse

      All of DR-NTUCommunities & CollectionsTitlesAuthorsBy DateSubjectsThis CollectionTitlesAuthorsBy DateSubjects

      My Account

      Login

      Statistics

      Most Popular ItemsStatistics by CountryMost Popular Authors

      About DR-NTU

      Improve the effectiveness of side channel attack: correlation-based power analysis in offline analysis

      Thumbnail
      FYP Final Report.pdf (3.214Mb)
      Author
      Leo, Feng Yi
      Date of Issue
      2016
      School
      School of Electrical and Electronic Engineering
      Abstract
      In the current world there a different types of encryption standard and the most commonly used is the Advanced Encryption Standard [2]. One of the most well-known and effective way of side channel attacks today is retrieving information which has been leaked through the power dissipated. Side channel information can be retrieved from the encrypted device with the power dissipated and the Ciphertext that is available to the attacker. The power dissipated can be measured using an oscilloscope Differential Power Analysis attack is one of the more commonly used attack compared to Simple Power Analysis attack. In this report of mine, I will be presenting on the Cryptography (which consist of Advanced Encryption Standards), Differential Power Analysis attack, Countermeasures towards the attacks, my methodology as well as my results and findings of my project. To attack the encrypted device, attackers use software platform that they develop to decrypt the Ciphertext to obtain the correct key. With the correct key, the attacker can reveal secret information from the device. Such software platforms could be developed using programming development platforms such as MATLAB, Java, Python and Microsoft Visual Studio. I will also be presenting on the methods on how I develop a SCA platform to reveal the key of the smartcards or cryptographic devices using Microsoft Visual Studio Programming Language C# and compare it with other SCA platform such as MATLAB which other attackers had developed.
      Subject
      DRNTU::Engineering
      Type
      Final Year Project (FYP)
      Rights
      Nanyang Technological University
      Collections
      • EEE Student Reports (FYP/IA/PA/PI)

      Show full item record


      NTU Library, Nanyang Avenue, Singapore 639798 © 2011 Nanyang Technological University. All rights reserved.
      DSpace software copyright © 2002-2015  DuraSpace
      Contact Us | Send Feedback
      Share |    
      Theme by 
      Atmire NV
       

       


      NTU Library, Nanyang Avenue, Singapore 639798 © 2011 Nanyang Technological University. All rights reserved.
      DSpace software copyright © 2002-2015  DuraSpace
      Contact Us | Send Feedback
      Share |    
      Theme by 
      Atmire NV
       

       

      DCSIMG