Side channels are communication channels based on execution characteristics that were not meant to be used for communication. Characteristics that underly side channels include execution time, power consumption, and electromagnetic emission. Side channels are known to be serious threats for cryptography implementations for many years. Technological improvements usually come with new possibilities for
side-channel attacks. For instance, the Internet of Things increased the targetable devices and made the threat more relevant than before.
The lab covers the steps necessary to mount side-channel attacks against cryptographic implementations, to recover secret information, and how to mitigate such vulnerabilities:
- implementation of a cryptographic algorithm (AES),
- manipulation of power- and time-traces,
- side-channel leakage model implementation,
- differential side-channel analysis (CPA and LRA),
- extraction of secret key from real-word traces,
- differential side-channel analysis.
The joint online kick-off meeting for labs and seminars offered by MAIS will happen on Thursday, 23.4.2020, at 16:00. We will provide more information how to join the online kick-off meeting via e-mail before the meeting. To receive information how to participate, please register for one of the courses via TUCaN or write a short e-mail to kickoff-2020@mais.informatik.tu-darmstadt.de in case you want to register in TUCaN after the kick-off meeting.