Side-channel and fault attacks
Module duration: 16 hours
Module overview
​
This module focuses on physical attacks mounted on devices processing secret information. We present side-channel attacks, which exploit information leaked by the devices during computations (e.g., power consumption and electromagnetic radiations), and fault attacks, which are techniques that stress the device and lead it to improper functioning. Both attacks aim to gain sensible data or bypass countermeasures.
Objective of this module
The main objective of this module is to provide the audience with an introduction to the physical attacks that can be mounted on devices in which some cryptographic secrets are handled, with particular attention to the side-channel and faults attacks. During the module, both these classes of attacks are presented, along with their application to some well-known cryptographic algorithms. At the end of the training, the audience will better understand the mathematical and physical properties exploited in these attacks. Furthermore, the audience will learn the main countermeasures to protect an implementation against such attacks.
What you will learn:
01.
What side-channel and fault attacks are.
02.
How to implement these attacks on well known cryptographic algorithms
03.
How to protect your device from these menaces
You will cover:
This module covers the following topics:
​
• Side-channel attacks and fault attacks
• How these attacks are implemented on AES, RSA, ECC, and Keccak algorithms
• How to mitigate them by implementing countermeasures
• Real-life examples of attacks
This module is
intended for:
This module targets professionals in silicon design, firmware or software developers, cryptographers, and security experts who need to broaden their knowledge about the security of devices in terms of physical attacks, mostly side-channels and faults attacks. Moreover, we suggest this module to managers and project managers who must acquire knowledge on the topic for their projects. We also highly recommend attending the module “Introduction to Security and Cryptography” to get the basic notions required for this module.