Mason Archival Repository Service

Side-Channel Analysis of Block Ciphers using CERG-GMU Interface on SASEBO-GII

Show simple item record

dc.contributor.advisor Kaps, Jens-Peter Prabhakaran, Abirami
dc.creator Prabhakaran, Abirami 2011-05-20 2011-06-01T15:01:25Z NO_RESTRICTION en_US 2011-06-01T15:01:25Z 2011-06-01
dc.description.abstract Field Programmable Gate Array(FPGAs) are used as a common platform for almost any type of design due to an increase in their logic capacity and various features such as DSP blocks, embedded processors, etc. A cryptographic algorithm implemented on FPGAs leaks data sensitive information through side channels such as power consumption, time taken for computations, temperature, etc. Many side-channel cryptanalysis methods exist to attack the physical implementation of cryptographic algorithms, thus rendering the algorithms insecure. One branch of side-channel attack is Di erential Power Analysis (DPA); where the attack is based on information gained from the power consumption of the cryptosystem. Recently, the Research Center for Information (RCIS) of AIST and Tohoku University developed the Side Channel Attack Standard Evaluation Board (SASEBO) as a common platform for evaluating side channel attacks. There are two FPGAs on a SASEBO board, a cryptographic FPGA - where the algorithm is implemented and a control FPGA - which communicates the data between the software (SASEBO Waveform Acquisition) and the cryptographic FPGA in an e cient manner. Sasebo Waveform Acquisition interacts with the hardware for processing data and collecting power traces for a DPA attack. The current interface between the control and cryptographic FPGA on the SASEBO-GII board is used to implement a block cipher and a hash algorithm. However, as the standard hardware interface proposed by the Cryptographic Engineering Research Group (CERG) of George Mason University has a di erent protocol for block ciphers and hash functions, the algorithms could not be directly integrated with the SASEBO-GII interface. This thesis focuses on designing a new interface, with modi cations made to the original SASEBO waveform acquisition software and the hardware on the control FPGA to interact with the protocol of CERG-GMU. The data communication between the software and hardware with implementations of lightweight block cipher was tested successfully on the modi ed 8-bit interface. Also, results from the DPA attack on AES on both the original SASEBO-GII interface and the modi ed interface are discussed.
dc.language.iso en_US en_US
dc.subject Side - Channel en_US
dc.subject CERG - GMU Interface en_US
dc.subject SASEBO en_US
dc.subject Correlation en_US
dc.subject Block Ciphers en_US
dc.title Side-Channel Analysis of Block Ciphers using CERG-GMU Interface on SASEBO-GII en_US
dc.type Thesis en Masters in Computer Engineering en_US Master's en Computer Engineering en George Mason University en

Files in this item

This item appears in the following Collection(s)

Show simple item record

Search MARS


My Account