This project developed my understanding of how AES encryption works and the different ‘trade offs’ between speed, memory usage and ultimately, security. An AES implementation was first developed to run a scale-board from the University of Bristol, this device has severe hardware limitations and thus any implementation must be efficient. One of the ways this was done was to pre-compute the sbox function. A Differential Power Attack (DPA) was then created in python to interact with the board in order to gather power traces. These recorded traces could then be compared to hypothetical power consumption values for a chosen message in order to recover the key, using approximately 125 traces. A counter-measure for this style of attack was implemented called masking, this carefully used 6 masks throughout the encryption process to prevent information leaking from the CPU. This prevented key recovery for ‘first order’ DPA style attacks.
-
Notifications
You must be signed in to change notification settings - Fork 0
This project developed my understanding of how AES encryption works and the different ‘trade offs’ between speed, memory usage and ultimately, security. An AES implementation was first developed to run a scale-board from the University of Bristol, this device has severe hardware limitations and thus any implementation must be efficient. One of t…
harrywaugh/UOB_AppliedSecurity
Folders and files
| Name | Name | Last commit message | Last commit date | |
|---|---|---|---|---|
Repository files navigation
About
This project developed my understanding of how AES encryption works and the different ‘trade offs’ between speed, memory usage and ultimately, security. An AES implementation was first developed to run a scale-board from the University of Bristol, this device has severe hardware limitations and thus any implementation must be efficient. One of t…
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published