This is an old revision of the document!


Laboratorul 06.

In this lab we'll implement a side-channel attack known as Correlation Power Analysis.

The principle is quite simple:

  1. Choose your target (generally the S-box output of some block cipher - in our case AES)
  2. Obtain a large number (thousands) of leakage samples for that target, when processing different plaintexts
  3. Choose a suitable leakage model (usually the hamming weight of the target value)
  4. For each possible key candidate (e.g. all values from 0 to 255), compute Person's correlation coefficient between the leakage model estimate for that key candidate and the real traces.
  5. Decide for the key that gives maximum correlation

We'll discuss more in detail at the lab.

In this lab we shall use Octave: http://www.gnu.org/software/octave/

You might also need these additional packages: http://sourceforge.net/projects/octave/files/Octave%20Windows%20binaries/ http://wiki.octave.org/Octave_for_Windows

Use these files as starting point: lab6.zip

sasc/laboratoare/06.1431003133.txt.gz · Last modified: 2015/05/07 15:52 by marios.choudary
CC Attribution-Share Alike 3.0 Unported
www.chimeric.de Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0