T4: Hardware Security – Breaking Ciphers of Chip Cards

Martin Novotný
Faculty of Information Technology
Czech Technical University in Prague
Prague, Czech Republic
Jiří Buček
Faculty of Information Technology
Czech Technical University in Prague
Prague, Czech Republic


Date

July 25 (Tuesday)


Duration

13:30 - 17:00 (Half-day)


Abstract

This tutorial will introduce you to the basics of the DPA (Differential Power Analysis) – a technique that exploits the dependency of the processed data on the power trace of the device to extract some secret information that would not be otherwise available. During the session you will learn how to process the power trace of the implementation of the AES encryption algorithm using an algebraic system (in our case Matlab), create the power hypothesis, extract the secret information and also how to measure the power consumption of the embedded system (smart card) in order to obtain the power traces.


About the Speakers

Martin Novotný is an assistant professor at the Faculty of Information Technology at the Czech Technical University in Prague. He graduated in electrical engineering from the Czech Technical University in Prague, Czech Republic in 1992. He received his Ph.D. degree in information security from Ruhr-University Bochum, Germany in 2009. His research interests include arithmetic units, cryptanalytical hardware, efficient hardware implementations of cryptographic algorithms, and embedded systems.


Jiří Buček graduated from the Faculty of Electrical Engineering of the Czech Technical University in Prague in 2002. Currently he is a Ph.D. student at the Faculty of Information Technology, Czech Technical University in Prague. His research interests are cryptography, modular arithmetic and FPGAs.




[Back]


Blank