Mostrar el registro sencillo del ítem

dc.contributor.advisorBecerra-López, Fernando I.
dc.contributor.authorArjona-Cabrera, Alberto
dc.date.accessioned2022-08-09T03:04:39Z
dc.date.accessioned2023-03-10T18:12:12Z
dc.date.available2022-08-09T03:04:39Z
dc.date.available2023-03-10T18:12:12Z
dc.date.issued2020-11
dc.identifier.citationArjona-Cabrera, A. (2020). On the Security of Embedded Systems Against Side-Channel Attacks. Trabajo de obtención de grado, Maestría en Ciencia de Datos. Tlaquepaque, Jalisco: ITESO.es_MX
dc.identifier.urihttps://hdl.handle.net/20.500.12032/71651
dc.descriptionSide-Channel Analysis (SCA) represents a serious threat to the security of millions of smart devices that form part of the so-called Internet of Things (IoT). On the other hand, perform the "right- fitting" cryptographic code for the IoT is a highly challenging task due to the reduced resource constraints of must of the IoT devices and the variety of cryptographic algorithms on disposal. An important criterion to assess the suitability of a light-weight cipher implementation, with respect to the SCA point of view, is the amount of energy leakage available to an adversary. In this thesis, the efficiency of a selected function that is commonly used in AES implementations in the perspective of Correlation Power Analysis (CPA) attacks are analyzed, leading to focus on the very common situation where the exact time of the sensitive processing is drowned in a large number of leakage points. In the particular case of statistical attacks, much of the existing literature essentially develop the theory under the assumption that the exact sensitive time is known and cannot be directly applied when the latter assumption is relaxed, being such a particular aspect for the simple Differential Power Analysis (DPA) in contrast with the CPA. To deal with this issue, an improvement that makes the statistical attack a real alternative compared with the simple DPA has been proposed. For the power consumption model (Hamming Weight model), and by rewriting the simple DPA attacks in terms of correlation coefficients between Boolean functions. Exhibiting properties of S-boxes relied on CPA attacks and showing that these properties are opposite to the non-linearity criterion and to the propagation criterion assumed for the former DPA. In order to achieve this goal, the study has been illustrated by various attack experiments performed on several copies implementations of the light-weight AES chipper in a well-known micro-controller educative platform within an 8-bit processor architecture deployed on a 350 nanometers CMOS technology. The Side-channel attacks presented in this work have been set in ideal conditions to capture the full complexity of an attack performed in real-world conditions, showing that certain implementation aspects can influence the leakage levels. On the other side, practical improvements are proposed for specific contexts by exploring the relationship between the non-linearity of the studied selection function and the measured leakages, with the only pretension to bridge the gap between the theory and the practice. The results point to new enlightenment on the resilience of basic operations executed by common light-weight ciphers implementations against CPA attacks.es_MX
dc.language.isoenges_MX
dc.publisherITESOes_MX
dc.rights.urihttp://quijote.biblio.iteso.mx/licencias/CC-BY-NC-2.5-MX.pdfes_MX
dc.subjectCorrelation Power Analysises_MX
dc.subjectSide-Channel Analysises_MX
dc.subjectAES Chipperes_MX
dc.subjectModeling Power Consumptiones_MX
dc.subjectKey Recoveryes_MX
dc.subjectLinear Correlationes_MX
dc.subjectPearson’s Correlationes_MX
dc.subjectComplexities Analysises_MX
dc.subjectAlgorithmic Securityes_MX
dc.subjectHamming Distancees_MX
dc.subjectElectromagnetismes_MX
dc.subjectSpectrographyes_MX
dc.subjectXORes_MX
dc.titleOn the security of embedded systems against side-channel attackses_MX
dc.typeinfo:eu-repo/semantics/masterThesises_MX


Ficheros en el ítem

FicherosTamañoFormatoVer
On the security ... t side-channel attacks.pdf4.449Mbapplication/pdfVer/

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem


© AUSJAL 2022

Asociación de Universidades Confiadas a la Compañía de Jesús en América Latina, AUSJAL
Av. Santa Teresa de Jesús Edif. Cerpe, Piso 2, Oficina AUSJAL Urb.
La Castellana, Chacao (1060) Caracas - Venezuela
Tel/Fax (+58-212)-266-13-41 /(+58-212)-266-85-62

Nuestras redes sociales

facebook Facebook

twitter Twitter

youtube Youtube

Asociaciones Jesuitas en el mundo
Ausjal en el mundo AJCU AUSJAL JESAM JCEP JCS JCAP