Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/64545
Full metadata record
DC FieldValueLanguage
dc.contributor.authorCheng, Vjin
dc.date.accessioned2015-05-28T02:37:37Z
dc.date.available2015-05-28T02:37:37Z
dc.date.copyright2015en_US
dc.date.issued2015
dc.identifier.urihttp://hdl.handle.net/10356/64545
dc.description.abstractIn today’s digital era, all kinds of information and data are being shared and transmitted across networks and systems. These data may sometimes be sensitive and needed to be secured, only accessible to selected viewer. With that the need for encryption on data is created, providing a layer of protection towards data. Advance Encryption Standard 128 bit (AES 128) is among the most popular secret key technique encryption being used today. The secret key value is the heart of AES encryption and must always remain hidden to ensure the encryption is secured. Since valuable information is present within encrypted data, cryptanalysis which is the study of ciphers with the aim of breaking the encryption is born. Side channel attack is a type of cryptanalysis which focuses on the weakness within the physical implementation of cryptosystem. Power analysis attack is a branch of side channel attacks and uses the leaked voltages to form a pattern and link to the secret key values. In this project, the student is tasked with creating a tool that helps in the process of power analysis attack on AES encryption system. This tool will help in finding the secret key values based on partial information on the secret key gathered by the attack. The tool consists of an algorithm that will reverse engineer certain valid steps used for AES encryption to generate the secret key. This algorithm was given the name “Reverse Key Algorithm”. Besides formulating the algorithm theoretically, the student task was also task to implement and test this algorithm in both software program (MATLAB) and digital hardware circuit design (Multisim). The implementation of both methods was found to be a success, as the original key was successfully found after performing sample tests. The results also showed that hardware implementation was found to be approximately 50% quicker than the software. Based on the results, it was proven that the reverse key algorithm formula was indeed accurate and can be used as a tool for cryptanalysis attack on Advance Encryption Standard in finding the original key values.en_US
dc.format.extent97 p.en_US
dc.language.isoenen_US
dc.rightsNanyang Technological University
dc.subjectDRNTU::Engineering::Electrical and electronic engineeringen_US
dc.titleDesign and implement a reverse key algorithm for the AES 128 bit cryptographyen_US
dc.typeFinal Year Project (FYP)en_US
dc.contributor.supervisorGwee Bah Hweeen_US
dc.contributor.schoolSchool of Electrical and Electronic Engineeringen_US
dc.description.degreeBachelor of Engineeringen_US
item.fulltextWith Fulltext-
item.grantfulltextrestricted-
Appears in Collections:EEE Student Reports (FYP/IA/PA/PI)
Files in This Item:
File Description SizeFormat 
FYP Report.pdf
  Restricted Access
4.97 MBAdobe PDFView/Open

Page view(s) 50

175
checked on Oct 28, 2020

Download(s) 50

25
checked on Oct 28, 2020

Google ScholarTM

Check

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.