University of Twente Student Theses

Login

Hardening FPGA-based AES implementations against side channel attacks based on power analysis

Thoonen, M.A.W. (2019) Hardening FPGA-based AES implementations against side channel attacks based on power analysis.

This is the latest version of this item.

[img] PDF
831kB
Abstract:Differential Power Analysis (DPA), is a type of Side Channel Attack (SCA) which exploits the power-consumption-dependent information leaks to extract the secret key of an AES implementation on an ASIC or FPGA. In this project, we would like to investigate how the power profile of an FPGA-based AES implementation could be modified in a manner that hinders DPA. Specifically, it will be explored whether changing the timing / the structure / the Look-Up Table (LUT) contents of the circuit will prevent this security breach. This will be done using RapidSmith2, a toolset which allows LUT-level manipulations of a netlist, for an implementation on Xilinx FPGAs. Apart from checking whether the information in the power profile of an FPGA is obscured, it also has to be ensured that the functionality of the AES implementation is preserved. The AES circuit will be implemented on a Zedboard Xilinx FPGA evaluation and prototyping board.
Item Type:Essay (Bachelor)
Faculty:EEMCS: Electrical Engineering, Mathematics and Computer Science
Subject:53 electrotechnology, 54 computer science
Programme:Electrical Engineering BSc (56953)
Link to this item:https://purl.utwente.nl/essays/77311
Export this item as:BibTeX
EndNote
HTML Citation
Reference Manager

 

Repository Staff Only: item control page