Analýza postranních kanálů: efektivní implementace útoků a protiopatření odolná proti poruchám
Side-Channel Analysis: Efficient Attacks and Fault-Tolerant Countermeasures
dc.contributor.advisor | Kubátová Hana | |
dc.contributor.author | Vojtěch Miškovský | |
dc.date.accessioned | 2020-09-28T21:11:02Z | |
dc.date.available | 2020-09-28T21:11:02Z | |
dc.date.issued | 2019-11-30 | |
dc.identifier | KOS-684007604105 | |
dc.identifier.uri | http://hdl.handle.net/10467/90933 | |
dc.description.abstract | Since side-channel analysis poses a serious threat to cryptographic devices, it became an extensively researched area. Two topics related to side-channel analysis are the main aim of this dissertation thesis: ecient attack implementations and fault-tolerance of SCA countermeasures. Three approaches for time-ecient enhancements of correlation power analysis are proposed: ecient computations, trace aggregation, and edge-detection-based key candidate selection. All three approaches proved to be functional and useful by experimental evaluations. We also evaluate how dierent dependable architectures based on dierent kinds of redundancy aect resistance to side-channel analysis. The results show, that the in- uence is not statistically signicant. In accordance with this result, architectures for dependable and secure design were proposed. These architectures are based on hardware modular redundancy and masking schemes. The case study shows, that the proposed architectures keep the simplicity of the modular redundancy architectures and the SCA resistance of masking schemes, while it signicantly saves resources. | cze |
dc.description.abstract | Since side-channel analysis poses a serious threat to cryptographic devices, it became an extensively researched area. Two topics related to side-channel analysis are the main aim of this dissertation thesis: ecient attack implementations and fault-tolerance of SCA countermeasures. Three approaches for time-ecient enhancements of correlation power analysis are proposed: ecient computations, trace aggregation, and edge-detection-based key candidate selection. All three approaches proved to be functional and useful by experimental evaluations. We also evaluate how dierent dependable architectures based on dierent kinds of redundancy aect resistance to side-channel analysis. The results show, that the in uence is not statistically signicant. In accordance with this result, architectures for dependable and secure design were proposed. These architectures are based on hardware modular redundancy and masking schemes. The case study shows, that the proposed architectures keep the simplicity of the modular redundancy architectures and the SCA resistance of masking schemes, while it signicantly saves resources. : | eng |
dc.publisher | České vysoké učení technické v Praze. Vypočetní a informační centrum. | cze |
dc.publisher | Czech Technical University in Prague. Computing and Information Centre. | eng |
dc.rights | A university thesis is a work protected by the Copyright Act. Extracts, copies and transcripts of the thesis are allowed for personal use only and at one?s own expense. The use of thesis should be in compliance with the Copyright Act http://www.mkcr.cz/assets/autorske-pravo/01-3982006.pdf and the citation ethics http://knihovny.cvut.cz/vychova/vskp.html | eng |
dc.rights | Vysokoškolská závěrečná práce je dílo chráněné autorským zákonem. Je možné pořizovat z něj na své náklady a pro svoji osobní potřebu výpisy, opisy a rozmnoženiny. Jeho využití musí být v souladu s autorským zákonem http://www.mkcr.cz/assets/autorske-pravo/01-3982006.pdf a citační etikou http://knihovny.cvut.cz/vychova/vskp.html | cze |
dc.subject | Security | cze |
dc.subject | Dependability | cze |
dc.subject | Side-Channel Analysis | cze |
dc.subject | Dierential Power Analysis | cze |
dc.subject | CorrelationPower Analysis | cze |
dc.subject | Security | eng |
dc.subject | Dependability | eng |
dc.subject | Side-Channel Analysis | eng |
dc.subject | Dierential Power Analysis | eng |
dc.subject | CorrelationPower Analysis | eng |
dc.title | Analýza postranních kanálů: efektivní implementace útoků a protiopatření odolná proti poruchám | cze |
dc.title | Side-Channel Analysis: Efficient Attacks and Fault-Tolerant Countermeasures | eng |
dc.type | disertační práce | cze |
dc.type | doctoral thesis | eng |
dc.contributor.referee | Di Natale Giorgio | |
theses.degree.discipline | Informatika | cze |
theses.degree.grantor | katedra číslicového návrhu | cze |
theses.degree.programme | Informatika | cze |