Please use this identifier to cite or link to this item:
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNg, Kwan Xhenen_US
dc.identifier.citationNg, K. X. (2022). Side-channel attack analysis & application. Final Year Project (FYP), Nanyang Technological University, Singapore.
dc.description.abstractSide-channel attacks generally take advantage of the fact there are information leakages in hardware that perform encryption processes such as the Advanced Encryption Standard (AES). In order to extract sensitive information, techniques such as Differential Power Analysis (DPA) or Correlation Power Analysis (CPA) are used. These techniques allow the attacker to extract valuable information and uncover the key to breaking the encryption. In this report, we will study the use of ChipWhisperer, a low-cost open-source project that helps standardize the functions for breaking into such encryption. This project also aims to enhance the attacking process by creating a web app to allow users to interact through a more familiar browser interface to conduct side-channel attacks.en_US
dc.publisherNanyang Technological Universityen_US
dc.subjectEngineering::Electrical and electronic engineeringen_US
dc.titleSide-channel attack analysis & applicationen_US
dc.typeFinal Year Project (FYP)en_US
dc.contributor.supervisorGwee Bah Hweeen_US
dc.contributor.schoolSchool of Electrical and Electronic Engineeringen_US
dc.description.degreeBachelor of Engineering (Electrical and Electronic Engineering)en_US
item.fulltextWith Fulltext-
Appears in Collections:EEE Student Reports (FYP/IA/PA/PI)
Files in This Item:
File Description SizeFormat 
Final Report Ng Kwan Xhen.pdf
  Restricted Access
2.11 MBAdobe PDFView/Open

Page view(s)

Updated on Apr 17, 2024


Updated on Apr 17, 2024

Google ScholarTM


Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.