What are you looking for?
Side Channel Analysis Trainings
Gain a comprehensive understanding of hardware security evaluation through side channel analysis (SCA) techniques.
Side Channel Analysis Fundamentals to Advanced Techniques
Our comprehensive side channel analysis training programs offer a practical approach to learning, combining theoretical knowledge, real-world demonstrations, and hands-on exercises.
Essential Side Channel Analysis Training
Explore the fundamentals of side channel analysis, cryptographic concepts, statistical techniques, and how to perform power analysis on embedded systems.
- An introduction to side channel analysis, covering the basics of side channels, essential tools, standard devices, and fundamental concepts of cryptography and statistics
- Practical assignment: Build a power analysis setup, acquire power traces, and perform signal processing (alignment, resampling, filtering)
- Common flavors of power analysis: Simple power analysis (SPA), differential power analysis (DPA), and correlation power analysis (CPA)
- Power analysis practical assignment: Build a setup, prepare device and interface, acquire power traces, and perform DPA on a software implementation of Data Encryption Standard / Advanced Encryption Standard (DES / AES)
- Module development practical assignment: Write simple modules for signal processing and device communication using Inspector
- Hardware crypto practical assignment: Attack a hardware implementation of DES / AES
Electromagnetic analysis (EMA)
- Principles and tools
- Finding the hotspot
- Acquisition and signal processing
- Practical assignment: Differential electromagnetic analysis (DEMA) on a hardware implementation of DES
Practical assignment: Other crypto implementations and attacks
- Countermeasures
- Known key analysis
- Public key crypto
Advanced Side Channel Analysis Training
Apply advanced tooling and methods to secure your devices from side-channel attacks. Learn from practical case studies in a classroom setting.
- Brief introduction to SCA, signal processing, and correlational power analysis (CPA)
- t-test for hot-spot finding and test vector leakage assessment (TVLA)
- Template analysis, SPA- and DPA-type attacks
- Implementing complex leakage models
- Creating and using custom leakage models in the Keysight Inspector solution
Case study: Secure boot
- Identify sensitive points in the secure boot process
- Prerequisites for attacking each sensitive point
- Break down the attack(s) into simple falsifiable tests
Case study: Characterization of a system-on-chip (SoC)
- Simple tests to identify fault models
- Hardware elements susceptible to faults: Where did the fault occur?
- Software constructs susceptible to faults
- Knowing the fault models: How can your implementation be improved?
Side Channel Analysis with AI
Dive deep into power and electromagnetic analysis methods and perform testing on both smart cards and embedded chips — assess the robustness of chips with no or basic countermeasures of moderate complexity.
Interested in this service? Reach out to learn more.