# 14035 - Application of Side-Channel Analysis Methods in the Earlier Design Phase of Cryptographic Implementations Modulübersicht

 Module Number: 14035 Module Title: Application of Side-Channel Analysis Methods in the Earlier Design Phase of Cryptographic Implementations Anwendung von Seitenkanalanalyse-Methoden in der frühen Entwurfsphase kryptographischer Designs Department: Faculty 1 - Mathematics, Computer Science, Physics, Electrical Engineering and Information Technology Responsible Staff Member: Hon.Prof. Dr.-Ing. Dyka, Zoya Language of Teaching / Examination: English Duration: 1 semester Frequency of Offer: Every semester Credits: 6 Learning Outcome: Upon completion of the module, students will be familiar with various statistical, machine learning, and clustering methods for analyzing side-channel leakage sources. They are able to apply these methods and evaluate and comparatively discuss their effectiveness in extracting secret data.They will be able to use, understand, and describe selected methods for analyzing a given set of traces. They understand the applicability of the analysis methods as a means to determine the vulnerability of cryptographic designs in their early design phase, using the example of a hardware accelerator of elliptic curve point multiplication for an elliptic curve cryptosystem. Contents: This course covers both theoretical and practical aspects of applying statistical and machine learning methods as a means of extracting secret data for side-channel attacks. Selected statistical as well as clustering methods will be presented and described. The suitability of the methods for determining side-channel leakage sources in attacked designs is discussed. Furthermore, selected countermeasures against physical attacks are presented and their effectiveness is discussed.   Main topics covered are:Evaluation of algorithmic countermeasures such as elliptic curve point blinding, scalar randomization, and scalar splitting on the resistance of cryptographic accelerators for elliptic curve cryptosystems against horizontal side-channel attacksImportance of analytics in identifying side-channel leakage sources in the early design phase of cryptographic designs Recommended Prerequisites: None Mandatory Prerequisites: Passed exam of module:11863  Hands on Knowledge for Side Channel Attacks Forms of Teaching and Proportion: Seminar / 2 Hours per Week per Semester Study project / 60 Hours Research paper/essay / 30 Hours Self organised studies / 60 Hours Teaching Materials and Literature: Kabin, Ievgen & Kreiser, Dan & Dyka, Zoya & Langendoerfer, Peter. (2018). FPGA Implementation of ECC: Low-Cost Countermeasure against Horizontal Bus and Address-Bit SCA. 1-7. 10.1109/RECONFIG.2018.8641732Kabin, I., Dyka, Z., Klann, D. et al. Resistance of the Montgomery Ladder Against Simple SCA: Theory and Practice. J Electron Test 37, 289–303 (2021). https://doi.org/10.1007/s10836-021-05951-3 Module Examination: Continuous Assessment (MCA) Assessment Mode for Module Examination: presentation: 5-10 minutes (10%);written report: 5-10 pages (50%),implementation: proven correct functionality (40%) Evaluation of Module Examination: Performance Verification – graded Limited Number of Participants: 10 Part of the Study Programme: Master (research-oriented) / Cyber Security / PO 2017 Master (research-oriented) / Informatik / PO 2008 Remarks: Study programme Cyber Security M.Sc.: Compulsory elective module in complex "Cyber Security Methods"Study programme Informatik M.Sc.: Compulsory elective module in complex „Angewandte und Technische Informatik" (level 400) Module Components: Seminar Application of Side-Channel Analysis Methods in the Earlier Design Phase of Cryptographic Implementations Components to be offered in the Current Semester: no assignment