Optimization methods for side channel attacks

Youssef Souissi 1
1 Groupe SEN
LTCI - Laboratoire Traitement et Communication de l'Information, Département Communications & Electronique, Télécom Paristech, Institut Mines Télécom
Abstract : The security of modern embedded systems has been the subject of intensive research in engineering areas. Recent threats called Side-Channel Analysis (SCA) have attracted much attention in embedded security areas. SCAs are passive attacks, in that the device under attack is not aware of its leaks being recorded. Therefore, the need of securing and evaluating the robustness of embedded systems against SCAs becomes obvious. Basically, four aspects of security evaluation analysis should be taken into consideration: the acquisition of Side-channel traces, the preprocessing of traces acquired, the detection and extraction of cryptographic patterns from the preprocessed traces, and finally the recovery of sensitive information, referred to as the secret key. This thesis investigates new techniques in the analysis of systems for Side-channel attacks.It considers how evaluation targets are characterized, how their behaviour may be simulated -- in order to hone targets for empirical analysis and then how data can be collected and analysed. The overall goal is the establishment of a methodological basis for this work. The first part of this thesis focuses on physical cryptanalysis. Several solutions and generic Side-channel attacks are addressed. The second part of this thesis is devoted to the pre-processing of the Side-channel leaked information. We propose new techniques and efficient pre-processing algorithms to get rid off the issues related principally to the noise and de-synchronisation problems.In the last part of this thesis, we establish a methodological framework, which aims at best organizing the task of the evaluator.We also highlight common pitfalls made by evaluators.
Document type :
Theses
Complete list of metadatas

Cited literature [131 references]  Display  Hide  Download

https://pastel.archives-ouvertes.fr/pastel-00681665
Contributor : Youssef Souissi <>
Submitted on : Thursday, March 22, 2012 - 9:25:53 AM
Last modification on : Thursday, October 17, 2019 - 12:36:50 PM
Long-term archiving on : Wednesday, December 14, 2016 - 5:31:45 PM

Identifiers

  • HAL Id : pastel-00681665, version 1

Citation

Youssef Souissi. Optimization methods for side channel attacks. Embedded Systems. Télécom ParisTech, 2011. English. ⟨pastel-00681665⟩

Share

Metrics

Record views

634

Files downloads

3634