Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/176336
Title: | Side channel power analysis on a target with an AES-256 encryption | Authors: | Liu, Junnan | Keywords: | Engineering | Issue Date: | 2024 | Publisher: | Nanyang Technological University | Source: | Liu, J. (2024). Side channel power analysis on a target with an AES-256 encryption. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/176336 | Project: | A2075-231 | Abstract: | Information security often relies on strong cryptographic algorithms like Advanced Encryption Standard (AES). However, cracking AES encryption with side-channel attacks (SCA) has become a growing concern. SCA exploits fluctuations in a device's power consumption during encryption, potentially revealing crucial information about the secret key. This has highlighted the significance of further research on understanding how SCA bypasses the protections offered by AES, ultimately compromising the confidentiality of encrypted data. This project involves the implementation of AES-128, AES-192, and AES-256 on a microcontroller, and the recovery of the secret key with SCA, to further investigate the vulnerabilities of a target device utilising such cryptographic algorithms to such attacks. We implemented AES encryption on a device by importing the ‘Crypto’ library in Arduino IDE. Power traces were collected and saved by importing a specialised library supporting the connection with the oscilloscope and ‘NumPy’ in Python script, respectively. SCA and analysis were conducted using the Async2Secure SCA toolkit. We employed Correlation Power Analysis (CPA), a technique that yields correlation coefficients for identifying correlations between power consumption patterns and specific bytes of secret keys. The report details the experimental setup, data acquisition process, and analysis methods used. The results section presents the success rate of the attack in recovering the secret key. We also discuss factors influencing the attack's effectiveness, such as the number of power traces captured and the change in correlation coefficients. | URI: | https://hdl.handle.net/10356/176336 | Schools: | School of Electrical and Electronic Engineering | Fulltext Permission: | restricted | Fulltext Availability: | With Fulltext |
Appears in Collections: | EEE Student Reports (FYP/IA/PA/PI) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
FYP_FinalReport_LiuJunnan.pdf Restricted Access | 3.87 MB | Adobe PDF | View/Open |
Page view(s)
103
Updated on Mar 27, 2025
Download(s)
9
Updated on Mar 27, 2025
Google ScholarTM
Check
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.