CSE 5/7/8393 Security: Side Channel Attack
Side Channel Attacks

Summer 2013         MW 12:00-2:10  PM       Location: Caruth 179

CSE 5/7/8389 Security: Side Channel Attacks

Mitch Thornton, Caruth Hall, Office 481, 214-768-1371, mitch@lyle.smu.edu

Mon, Wed: 11:00AM-11:50PM or by appointment
If you need academic accomodations for a disability, you must first contact Disability Accommodations & Success Strategies (DASS) at 214-768-1470 or www.smu.edu/alec/dass.asp to verify the disability and to establish eligibility for accommodations. Then you must schedule an appointment with the professor to make appropriate arrangements.

Religiously observant students wishing to be absent on holidays that require missing class should notify their professors in writing at the beginning of the semester, and should discuss with them, in advance, acceptable ways of making up any work missed because of the absence.  (See University Policy No. 1.9.)

Students participating in an officially sanctioned, scheduled University extracurricular activity should be given the opportunity to make up class assignments or other graded assignments missed as a result of their participation.  It is the responsibility of the student to make arrangements with the instructor prior to any missed scheduled examination or other missed assignment for making up the work.    (See the University Undergraduate Catalog).
S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks, Springer, 2010, ISBN 978-1-4419-4039-1.

J. Ambrose, A. Ignjatovic, and S. Parameswaran, Power Analysis Side Channel Attacks, VDM Verlag, 2010, ISBN 978-3-8364-8508-1.

P. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, in Proc. Advances in Cryptography (CRYPTO), pp. 388-397, 1999. 
P. Kocher, J. Jaffe, and B. Jun, Introduction to Differential Power Analysis and Related Attacks, Tech. Report, Cryptography Research, Inc., 1998.
Y. Zhou and D. Feng, Side-Channel Attacks: Ten Years after its Publication and the Impacts on Cryptographic Module Security Testing, in Proc. Information Security Seminar (WS 06/07), 2005. 
X.Charvet and H. Pelletier, Improving the DPA Attack using the Wavelet Transform, in Proc. NIST Physical Security Testing Workshop, vol. 46, 2005. 
P. Kocher, J. Jaffe, and B. Jun (inventors), Differential Power Analysis, U.S. Patent 7,599,488 B2, Oct. 6, 2005.
P. Kocher, P. Rohatagi, and J. Jaffe (inventors), Verifiable and Leak-resistant Encryption and Decryption, U.S. Patent 8,386,800 B2, Feb. 26, 2013.
E. Oakley (inventor), Analysis Resistant Cipher Method and Apparatus, U.S. Patent 7,477,741 B2, Jan. 13, 2009.
P. Kocher and J. Jaffe (inventors), Leak-resistant Cryptographic Method and Apparatus, U.S. Patent 6,304,658 B1, Oct. 16, 2001.

NIST Computer Security Standards (including FIPS 140)

Side channel attacks extract sensitive information from information technology devices through indirect means such as monitoring power flow and electromagnetic radiation. Methods of particular concern are simple and differential power analysis where the adversary monitors the power flow to a system and then extracts crucial information such as an encryption key code. This course will survey these methods allowing students to understand how they are implemented and to then formulate countermeasures to harden such systems.

1. Introduction to Probability and Statistics
2. Digital Systems Design
3. OR consent of instructor

P. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, video presentation, presented at Advances in Cryptography (CRYPTO), 1998.
Physical Security Workshop, schedule with links to papers, Decmber, 2005.
Website for the DPA Contest, accessed 20130615
IEEE Conference Paper Templates (in MS Word and LaTeX format)

Class Schedule
Grading Policy
Presentation/Project Suggestions

 - Introduction to Side Channel Attacks
 - Basics of Digital System Power Dissipation and Models
 - Methods for Side Channel Data Collection
 - Information Theory and Encryption Survey
 - Single Point Statistics
 - Power Trace Statistics and Analysis
 - Simple Power Analysis (SPA) Attacks
 - SPA Countermeasures
 - Differential Power Analysis (DPA) Attacks
 - DPA Countermeasures
 - Selected Topics