Show simple item record

dc.contributor.authorMuir, Jamesen 14:25:03 (GMT) 14:25:03 (GMT)
dc.description.abstractThe traditional model of cryptography examines the security of cryptographic primitives as mathematical functions. This approach does not account for the physical side effects of using these primitives in the real world. A more realistic model employs the concept of a <I>side channel</I>. A side channel is a source of information that is inherent to a physical implementation of a primitive. Research done in the last half of the 1990s has shown that the information transmitted by side channels, such as execution time, computational faults and power consumption, can be detrimental to the security of ciphers like DES and RSA. This thesis surveys the techniques of side channel cryptanalysis presented in [Kocher1996], [Boneh1997], and [Kocher1998] and shows how side channel information can be used to break implementations of DES and RSA. Some specific techniques covered include the timing attack, differential fault analysis, simple power analysis and differential power analysis. Possible defenses against each of these side channel attacks are also discussed.en
dc.format.extent533230 bytes
dc.publisherUniversity of Waterlooen
dc.rightsCopyright: 2001, Muir, James. All rights reserved.en
dc.subjectside channelen
dc.subjecttiming attacken
dc.subjectpower analysisen
dc.subjectfault analysisen
dc.titleTechniques of Side Channel Cryptanalysisen
dc.typeMaster Thesisen
dc.pendingfalseen and Optimizationen
uws-etd.degreeMaster of Mathematicsen

Files in this item


This item appears in the following Collection(s)

Show simple item record


University of Waterloo Library
200 University Avenue West
Waterloo, Ontario, Canada N2L 3G1
519 888 4883

All items in UWSpace are protected by copyright, with all rights reserved.

DSpace software

Service outages