Simulation of real-world side-channel attacks on elliptic-curve cryptography – Bc. Andrej Bátora
Bc. Andrej Bátora
Bachelor's thesis
Simulation of real-world side-channel attacks on elliptic-curve cryptography
Simulation of real-world side-channel attacks on elliptic-curve cryptography
Abstract:
Testovanie kryptografickej implementácie proti side-channel útokom, napríklad odberovej analýze, vyžaduje prístup k fyzickému zariadeniu na ktorom beží, náročný zber informácií zo side-channelov a implementáciu útoku. Tento proces je drahý a časovo náročný. Použitie emulátorov, ktoré simulujú únik cez side-channely, môže tento proces zlacniť a urýchliť. V tejto práci implementujeme side-channel leakage …moreAbstract:
Testing a cryptographic implementation against side-channel attacks, such as power analysis, requires access to a physical device that executes it, collecting information from the side channels using a complicated setup and implementing the attack. This process is expensive and time-consuming. Using emulators that simulate side-channel leakage can make the process cheaper and faster. In this thesis …more
Language used: English
Date on which the thesis was submitted / produced: 19. 12. 2023
Identifier:
https://is.muni.cz/th/sxu9a/
Thesis defence
- Date of defence: 12. 2. 2024
- Supervisor: RNDr. Ján Jančár
- Reader: Mgr. Jan Kvapil
Citation record
Full text of thesis
Contents of on-line thesis archive
Published in Theses:- světu
Other ways of accessing the text
Institution archiving the thesis and making it accessible: Masarykova univerzita, Fakulta informatikyMasaryk University
Faculty of InformaticsBachelor programme / field:
Informatics / Informatics
Theses on a related topic
-
Exemining and improving the security of elliptic curve cryptography
Vladimír Sedláček -
PYECSCA: Reverse-engineering black-box Elliptic Curve Cryptography implementations via side-channels
Ján Jančár -
Designing Optimized Architecture for Solving Elliptic Curve Discrete Log Problem Using Pollard's rho method
Harshit Kumar Singh -
Security considerations for elliptic curve domain parameters selection
Ján Jančár -
Cycles of pairing-friendly elliptic curves and their applications in cryptography
Tomáš Novotný -
GPU implementation of algorithms for side-channel attacks
Tomáš Jusko -
Hardware Security Project: extensive comparison of various side-channels setups.
Daud Naveed -
Maskování šifry AES na mikrořadiči a DPA druhého řádu
Abdullah Bhatti