PYECSCA: Reverse-engineering black-box Elliptic Curve Cryptography implementations via side-channels – Bc. Ján Jančár
Bc. Ján Jančár
Master's thesis
PYECSCA: Reverse-engineering black-box Elliptic Curve Cryptography implementations via side-channels
PYECSCA: Reverse-engineering black-box Elliptic Curve Cryptography implementations via side-channels
Abstract:
Oblasť side-channel útokov má dva hlavné ciele. Prvým je vyhodnotenie implementácii na zraniteľnosti z pohľadu side-channelov. Druhým je vývoj nových side-channel útokov, pri predpoklade nejakej zrantieľnosti implementácie. Práve tento druhý cieľ často vyžaduje veľmi presné vedomosti o detailoch implementácie, ktoré v prípade algoritmov ako AES alebo RSA môžu byť jednoduché na získanie. Avšak priestor …moreAbstract:
The usual goals of offensive Side Channel Analysis are mostly two-fold. One is to assess and quantify the presence of side channel leakage, the other is to assume leakage and target the secret key. The second goal often requires very precise knowledge of the implementation details, which might not be very extensive for algorithms like AES or RSA. However, the space of possible equivalent implementations …more
Language used: English
Date on which the thesis was submitted / produced: 20. 7. 2020
Identifier:
https://is.muni.cz/th/fjgay/
Thesis defence
- Date of defence: 15. 9. 2020
- Supervisor: doc. RNDr. Petr Švenda, Ph.D.
- Reader: prof. RNDr. Václav Matyáš, M.Sc.
Citation record
ISO 690-compliant citation record:
JANČÁR, Ján. \textit{PYECSCA: Reverse-engineering black-box Elliptic Curve Cryptography implementations via side-channels}. Online. Master's thesis. Brno: Masaryk University, Faculty of Informatics. 2020. Available from: https://theses.cz/id/tlywwr/.
Full text of thesis
Contents of on-line thesis archive
Published in Theses:- světu
Other ways of accessing the text
Institution archiving the thesis and making it accessible: Masarykova univerzita, Fakulta informatikyMasaryk University
Faculty of InformaticsMaster programme / field:
Informatics / Information Technology Security
Theses on a related topic
-
Exemining and improving the security of elliptic curve cryptography
Vladimír Sedláček -
Simulation of real-world side-channel attacks on elliptic-curve cryptography
Andrej Bátora -
Designing Optimized Architecture for Solving Elliptic Curve Discrete Log Problem Using Pollard's rho method
Harshit Kumar Singh -
Security considerations for elliptic curve domain parameters selection
Ján Jančár -
Cycles of pairing-friendly elliptic curves and their applications in cryptography
Tomáš Novotný -
GPU implementation of algorithms for side-channel attacks
Tomáš Jusko -
Simulation of real-world side-channel attacks on elliptic-curve cryptography
Andrej Bátora -
Hardware Security Project: extensive comparison of various side-channels setups.
Daud Naveed