Browsing by Subject "AES"
Now showing 1 - 5 of 5
- Results Per Page
- Sort Options
Item An adaptive measurement protocol for fine-grained electromagnetic side-channel analysis of cryptographic modules(2019-09-12) Iyer, Vishnuvardhan Venkatramani; Yilmaz, Ali E.An adaptive measurement protocol is presented to increase effectiveness of fine-grained electromagnetic side-channel analysis (EM SCA) attacks that attempt to extract the information that is unintentionally leaked from physical implementations of cryptographic modules. Because measured fields vary with probe parameters as well as the data being encrypted, identifying the optimal configurations requires searching among a large number of possible configurations. The proposed protocol is a multi-step acquisition that corresponds to a greedy search in a 4-D configuration space consisting of probe’s on-chip coordinates, orientation, and number of signals acquired. This 4-D space can be extended to a 6-D space by repeating the protocol for different probe sizes and heights. This approach is presented as an alternative to current fine-grained EM SCA techniques that perform exhaustive full-chip scans to isolate information leaking locations. To demonstrate the feasibility of the approach, the protocol is tested by performing EM SCA attacks for different configurations and identifying the best attack configuration for two realizations of the advanced encryption standard (AES), subject to the precision of the measurement equipment. It is found that the protocol requires ~20× to ~25× less acquisition time compared to an exhaustive search for the optimal attack configuration.Item Co-Simulation and Dynamic Assessment of Thermal Management Strategies Aboard Naval Surface Ships(Electric Ship Research and Development Consortium, 2013-12-31) Kiehne, ThomasItem The feasibility of memory encryption and authentication(2013-05) Owen, Donald Edward, Jr.; John, Lizy KurianThis thesis presents an analysis of the implementation feasibility of RAM authentication and encryption. Past research as used simulations to establish that it is possible to authenticate and encrypt the contents of RAM with reasonable performance penalties by using clever implementations of tree data structures over the contents of RAM. However, previous work has largely bypassed implementation issues such as power consumption and silicon area required to implement the proposed schemes, leaving implementation details unspecified. This thesis studies the implementation cost of AES-GCM hardware and software solutions for memory authentication and encryption and shows that software solutions are infeasible because they are too costly in terms of performance and power, whereas hardware solutions are more feasible.Item A predictive validity study of AES systems(2010-12) Park, Il, 1969-; Schallert, Diane L.; Dodd, BarbaraA predictive validity approach has been employed to find some implications to support evidences for Automated Essay Scoring (AES) systems. First, using R² values from multiple linear regression models, validity indices are compared first between multiple choice scores and essay scores across four AES systems. Secondly, R² values from models using only essay scores, the validity indices of four AES systems are hypothetically compared to see if how well AES systems could predict student outcome such as GPA.Item S/MIME client with wireless key passing for android(2015-12) Diaz, Ramiro Daniel; Barber, Suzanne; Bard, WilliamAs the value and vulnerability of personal data has increased, the security of digital communication and information has become more important. Currently, there exists no application that allows for a convenient transfer of secure digital communication on mobile devices as they continue to usurp the role of personal computers in the real world. This report will document my attempt to create one such application on the Android platform. This report will present a brief background of the algorithms intended to be used, as well as an overview of the evolution of the email protocols into the S/MIME protocol. It shall also cover related works that currently exist that we explored, or used in the creation of the application. In program requirements, the overall requirements of the application will be discussed in detail. In program design, we will describe the overall design and architecture of the application. Finally, program outcome will describe the difficulties faced in the process of implementing the work, the outcome itself and where it can be found, and future work that is needed for the application.