14035 - Application of Side-Channel Analysis Methods in the Earlier Design Phase of Cryptographic Implementations Modulübersicht

Module Number: 14035
Module Title:Application of Side-Channel Analysis Methods in the Earlier Design Phase of Cryptographic Implementations
  Anwendung von Seitenkanalanalyse-Methoden in der frühen Entwurfsphase kryptographischer Designs
Department: Faculty 1 - Mathematics, Computer Science, Physics, Electrical Engineering and Information Technology
Responsible Staff Member:
  • Hon.Prof. Dr.-Ing. Dyka, Zoya
Language of Teaching / Examination:English
Duration:1 semester
Frequency of Offer: Every semester
Credits: 6
Learning Outcome:Upon completion of the module, students will be familiar with various statistical, machine learning, and clustering methods for analyzing side-channel leakage sources. They are able to apply these methods and evaluate and comparatively discuss their effectiveness in extracting secret data.They will be able to use, understand, and describe selected methods for analyzing a given set of traces. They understand the applicability of the analysis methods as a means to determine the vulnerability of cryptographic designs in their early design phase, using the example of a hardware accelerator of elliptic curve point multiplication for an elliptic curve cryptosystem.
Contents:This course covers both theoretical and practical aspects of applying statistical and machine learning methods as a means of extracting secret data for side-channel attacks. Selected statistical as well as clustering methods will be presented and described. The suitability of the methods for determining side-channel leakage sources in attacked designs is discussed. Furthermore, selected countermeasures against physical attacks are presented and their effectiveness is discussed.
Main topics covered are:
  • Evaluation of algorithmic countermeasures such as elliptic curve point blinding, scalar randomization, and scalar splitting on the resistance of cryptographic accelerators for elliptic curve cryptosystems against horizontal side-channel attacks
  • Importance of analytics in identifying side-channel leakage sources in the early design phase of cryptographic designs
Recommended Prerequisites:None
Mandatory Prerequisites:Passed exam of module:
  • 11863  Hands on Knowledge for Side Channel Attacks
Forms of Teaching and Proportion:
  • Seminar / 2 Hours per Week per Semester
  • Study project / 60 Hours
  • Research paper/essay / 30 Hours
  • Self organised studies / 60 Hours
Teaching Materials and Literature:
  • Kabin, Ievgen & Kreiser, Dan & Dyka, Zoya & Langendoerfer, Peter. (2018). FPGA Implementation of ECC: Low-Cost Countermeasure against Horizontal Bus and Address-Bit SCA. 1-7. 10.1109/RECONFIG.2018.8641732
  • Kabin, I., Dyka, Z., Klann, D. et al. Resistance of the Montgomery Ladder Against Simple SCA: Theory and Practice. J Electron Test 37, 289–303 (2021). https://doi.org/10.1007/s10836-021-05951-3

Module Examination:Continuous Assessment (MCA)
Assessment Mode for Module Examination:
  • presentation: 5-10 minutes (10%);
  • written report: 5-10 pages (50%),
  • implementation: proven correct functionality (40%)
Evaluation of Module Examination:Performance Verification – graded
Limited Number of Participants:10
Part of the Study Programme:
  • Master (research-oriented) / Cyber Security / PO 2017
  • Master (research-oriented) / Informatik / PO 2008
  • Study programme Cyber Security M.Sc.: Compulsory elective module in complex "Cyber Security Methods"
  • Study programme Informatik M.Sc.: Compulsory elective module in complex „Angewandte und Technische Informatik" (level 400)
Module Components:
  • Seminar Application of Side-Channel Analysis Methods in the Earlier Design Phase of Cryptographic Implementations
Components to be offered in the Current Semester:
  • no assignment