Side-Channel Analysis in Hardware
Kód | Zakončení | Kredity | Rozsah | Jazyk výuky |
---|---|---|---|---|
NIE-HSC | Z,ZK | 4 | 2P+2C | anglicky |
- Garant předmětu:
- Vojtěch Miškovský
- Přednášející:
- Vojtěch Miškovský, Petr Socha
- Cvičící:
- Vojtěch Miškovský, Matúš Olekšák, Petr Socha
- Předmět zajišťuje:
- katedra číslicového návrhu
- Anotace:
-
This course is dedicated to so-called side-channel information leakage in hardware devices. It focuses on both theoretical analysis and practical attacks. Students get familiar with various kinds of side channels and they get deeper insight in power attacks. Students learn to implement various profiled and non-profiled attacks and get familiar with higher-order attacks. They also get practice in both designing the SCA countermeasures and analyzing the amount and characteristics of the side-channel information leakage.
- Požadavky:
-
Basic knowledge of cryptographic algorithms and their implementation in HW, recommended completion of MIE-BHW (NIE-BVS) and/or MIE-HWB courses.
- Osnova přednášek:
-
1. Introduction to side channels, information leakage, power consumption/EM radiation measurements
2. Formal model for side-channel attacks, differential power analysis, correlation power analysis
3. Mutual information analysis, Kolmogorov-Smirnov analysis
4. Template attacks, theoretical and experimental security metrics
5. Countermeasures based on Additional Modules, hiding
6. Countermeasures based on Secure Logic Styles, hiding
7. Countermeasures based on Module Alteration, masking
8. Attacks on protected implementations, univariate and multivariate higher order attacks, combining function
9. Machine learning in side-channel analysis, neural networks
10. Leakage assessment
11. Remote side-channel attacks, attacks on radio, attacks in cloud
12. Fault attacks, fault injection, combined attacks
13. Reserve
- Osnova cvičení:
-
1. Equipment introduction
2. Measurement introduction, timing attacks
3. Attack realisation I
4. Attack realisation II
5. Attack realisation III
6. Attack realisation IV
7. Countermeasures|hiding
8. Countermeasures|masking I
9. Countermeasures|masking II
10. Higher-order analysis
11. Attacking protected implementations
12. Finishing and evaluation
13. Reserve
- Cíle studia:
-
tudents get familiar with various kinds of side channels and they get deeper insight in power attacks. Students learn to implement various profiled and non-profiled attacks and get familiar with higher-order attacks. They also get practice in both designing the SCA countermeasures and analyzing the amount and characteristics of the side-channel information leakage.
- Studijní materiály:
-
TBA
- Poznámka:
-
Study materials will be placed at the Courses webpage.
- Další informace:
- https://courses.fit.cvut.cz/NI-HSC/
- Rozvrh na zimní semestr 2024/2025:
- Rozvrh není připraven
- Rozvrh na letní semestr 2024/2025:
- Rozvrh není připraven
- Předmět je součástí následujících studijních plánů:
-
- Master specialization Software Engineering, in English, 2021 (volitelný předmět)
- Master specialization Computer Security, in English, 2021 (volitelný předmět)
- Master specialization Computer Systems and Networks, in English, 2021 (volitelný předmět)
- Master specialization Design and Programming of Embedded Systems, in English, 2021 (volitelný předmět)
- Master specialization Computer Science, in English, 2021 (volitelný předmět)
- Study plan for Ukrainian refugees (volitelný předmět)
- Master Specialization Digital Business Engineering, 2023 (volitelný předmět)