ATTENTION/WARNING - NE PAS DÉPOSER ICI/DO NOT SUBMIT HERE

Ceci est la version de TEST de DIAL.mem. Veuillez ne pas soumettre votre mémoire sur ce site mais bien à l'URL suivante: 'https://thesis.dial.uclouvain.be'.
This is the TEST version of DIAL.mem. Please use the following URL to submit your master thesis: 'https://thesis.dial.uclouvain.be'.
 

Side channel analysis of commercial microcontrollers with AES coprocessor

(2019)

Files

Udvarhelyi_11621400_VanWassenhove_14871400_2019.pdf
  • Closed access
  • Adobe PDF
  • 46.6 MB

Details

Supervisors
Faculty
Degree label
Abstract
The STM32 and NXP Kinetis are two popular general-purpose 32-bit microcontrollers lines with optional hardware cryptographic engine. In this thesis, we analyze the resistance of those crypto engines to side channel attacks on the power consumption. We start by presenting two measurements setups with their advantages and drawbacks. Then we propose a general method from the detection to the attack of the AES-128 in a case where no information over the implementation is available. We present several methods used to acquire knowledge about the systems, then, we investigate 6 different attacks. Finally, we show that the complete key is recovered in 20,000 traces for the STM32 and partially recovered for the NXP Kinetis within 150,000 traces.