Side-Channel Analysis of Block Ciphers using CERG-GMU Interface on SASEBO-GII

dc.contributor.advisorKaps, Jens-Peter
dc.contributor.authorPrabhakaran, Abirami
dc.creatorPrabhakaran, Abirami
dc.date2011-05-20
dc.date.accessioned2011-06-01T15:01:25Z
dc.date.availableNO_RESTRICTION
dc.date.available2011-06-01T15:01:25Z
dc.date.issued2011-06-01
dc.description.abstractField Programmable Gate Array(FPGAs) are used as a common platform for almost any type of design due to an increase in their logic capacity and various features such as DSP blocks, embedded processors, etc. A cryptographic algorithm implemented on FPGAs leaks data sensitive information through side channels such as power consumption, time taken for computations, temperature, etc. Many side-channel cryptanalysis methods exist to attack the physical implementation of cryptographic algorithms, thus rendering the algorithms insecure. One branch of side-channel attack is Di erential Power Analysis (DPA); where the attack is based on information gained from the power consumption of the cryptosystem. Recently, the Research Center for Information (RCIS) of AIST and Tohoku University developed the Side Channel Attack Standard Evaluation Board (SASEBO) as a common platform for evaluating side channel attacks. There are two FPGAs on a SASEBO board, a cryptographic FPGA - where the algorithm is implemented and a control FPGA - which communicates the data between the software (SASEBO Waveform Acquisition) and the cryptographic FPGA in an e cient manner. Sasebo Waveform Acquisition interacts with the hardware for processing data and collecting power traces for a DPA attack. The current interface between the control and cryptographic FPGA on the SASEBO-GII board is used to implement a block cipher and a hash algorithm. However, as the standard hardware interface proposed by the Cryptographic Engineering Research Group (CERG) of George Mason University has a di erent protocol for block ciphers and hash functions, the algorithms could not be directly integrated with the SASEBO-GII interface. This thesis focuses on designing a new interface, with modi cations made to the original SASEBO waveform acquisition software and the hardware on the control FPGA to interact with the protocol of CERG-GMU. The data communication between the software and hardware with implementations of lightweight block cipher was tested successfully on the modi ed 8-bit interface. Also, results from the DPA attack on AES on both the original SASEBO-GII interface and the modi ed interface are discussed.
dc.identifier.urihttps://hdl.handle.net/1920/6392
dc.language.isoen_US
dc.subjectSide - Channel
dc.subjectCERG - GMU Interface
dc.subjectSASEBO
dc.subjectCorrelation
dc.subjectBlock Ciphers
dc.titleSide-Channel Analysis of Block Ciphers using CERG-GMU Interface on SASEBO-GII
dc.typeThesis
thesis.degree.disciplineComputer Engineering
thesis.degree.grantorGeorge Mason University
thesis.degree.levelMaster's
thesis.degree.nameMasters in Computer Engineering

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Prabhakaran_thesis_2011.pdf
Size:
15.71 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.65 KB
Format:
Item-specific license agreed upon to submission
Description: