course: Physical Attacks and Countermeasures
- teaching methods:
- lecture with tutorials
- responsible person:
- Priv.-Doz. Dr. Amir Moradi
- Priv.-Doz. Dr. Amir Moradi (ETIT)
- offered in:
- summer term
dates in summer term
- start: Monday the 24.04.2017
- lecture Mondays: from 14:15 to 15.45 o'clock in ID 03/471
- tutorial Mondays: from 16:00 to 16.45 o'clock in ID 03/471
- lab exercise Mondays: from 17:00 to 17.45 o'clock in ID 2/632
Written exam exam on 17.08.2017
Exam registration: FlexNow
ID 04/445: Alle Studierenden
Date according to prior agreement with lecturer.
Exam registration: FlexNow
- have Awareness of danger of cryptanalysis attacks targeting implementation of cryptographic algorithms
- understand the kinds of physical attacks, their prerequisites, and their required conditions to work
- know the countermeasure schemes to make a design protected against each physical attack
The modern cryptographic algorithms provide a reasonable level of security against the known mathematical and analytical cryptanalysis attacks. At the end the cryptographic algorithms are realized to be used in a security-enabled application. This realization is done by implementing the desired cryptographic algorithm using some program codes (in software) or using logic elements (in hardware). Physical access of the users to the cryptographic devices (e.g., a smartcard used for payment, a contactless card used for authentication, and smartphones) where a secret key is embedded brought a new form of attacks called physical attacks. This kind of attacks aims at extracting the secret key used by the cryptographic algorithm from the target implementation. Breaking a system by means of a physical attack does not infer to the weakness of the algorithm, but of the implementation. Therefore, considering such kinds of attack when designing a cryptographic device is a must. The goal of this lecture is to give an overview about the known physical attacks and most considerably the schemes developed to counter such a kind of attacks. In the first part of the lecture different kinds of physical attacks are introduced, while we focus later on countermeasures and the methods to make implementations resistant against the known physical attacks.
basic knowledge of data security and cryptography, a programming language (C++), computer architecture
Evaluation: The lecture is mainly project and assignment oriented. There will be an exam (written or oral) in addition to a project which students should do alone. Students who have good background on either software (assembly) or hardware (VHDL) implementation and moderate knowledge about electrical engineering are supposed to not have any serious problem in the course. Also, knowing basics of signal processing is a plus. The course is an ideal preparation phase for students who do their Master/Diploma thesis in the chair of Embedded Security.