Please use this identifier to cite or link to this item:
|Title:||Software implementation of side-channel analysis on AES encryption with different key length||Authors:||Heng, Denley Jing Jie||Keywords:||Engineering::Electrical and electronic engineering||Issue Date:||2022||Publisher:||Nanyang Technological University||Source:||Heng, D. J. J. (2022). Software implementation of side-channel analysis on AES encryption with different key length. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/157819||Project:||A2069-211||Abstract:||Cryptographic algorithms such as Advanced Encryption Standard (AES) are usually strong against mathematical attacks even with a huge amount of computing power. However, correlated information such as power consumption and electromagnetic emissions is leaked when the algorithms are implemented on a physical device. This leads to side-channel attacks (SCA) which can be used for exploiting the leakage to recover the cryptographic key. In order to increase the resistance against side-channel attacks, one way is to increase the key search complexity of encryption by increasing the key length. The implementation of stronger AES encryption such as 192-bit and 256-bit will be investigated. Furthermore, software implementation of side-channel analysis will be extended from AES 128 to AES 192/256 to extract the different round keys.||URI:||https://hdl.handle.net/10356/157819||Fulltext Permission:||restricted||Fulltext Availability:||With Fulltext|
|Appears in Collections:||EEE Student Reports (FYP/IA/PA/PI)|
Files in This Item:
|Software Implementation of Side-Channel Analysis on AES Encryption with Different Key Length.pdf|
|2.04 MB||Adobe PDF||View/Open|
Updated on Dec 5, 2022
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.