PORTALE DELLA DIDATTICA

Ricerca CERCA
  KEYWORD

Evaluating a side-channel simulation tool against real power traces of cryptographic software

azienda Thesis in external company    


keywords CRYPTOGRAPHY, SIDE-CHANNEL

Reference persons DANILO BAZZANELLA

External reference persons Matteo Bocchi (ST Microelectronics)

Research Groups Crittografia e teoria dei numeri

Thesis type THESIS WITH A COMPANY

Description Side-channel attacks are a real threat to embedded devices running cryptographic software. Particularly, power analysis takes advantage of the power consumption information of a device in order to retrieve secret data involved in the cryptographic computations.
Some simulation tools have been developed to help with the analysis of those vulnerabilities, simplifying the process with respect to running on real embedded targets.
This project aims to analyze how much the simulated traces produced by the simulation tools, in this case Rainbow, are comparable to real power consumption traces, and how much using these simulators can help in finding and removing side-channel vulnerabilities.
As first step, the student could understand the benefits and limitations of Rainbow, and then develop a framework allowing a better usability with ST embedded targets.
Finally, the traces generated by the tool should be validated against real power traces acquired on ARM Cortex-M microcontroller, thanks to NewAE Technology ChipWhisperer tool.


Deadline 22/06/2023      PROPONI LA TUA CANDIDATURA




© Politecnico di Torino
Corso Duca degli Abruzzi, 24 - 10129 Torino, ITALY
Contatti