Side-channel analysis (SCA) is demonstrated to be an effective way to recover secret keys stored in cryptographic ICs by observing and recording its power consumption. SETS is capable of performing vulnerability analysis of symmetric (such as stream and block ciphers and authenticated encryption schemes), asymmetric key ciphers (RSA, DSA, ECC) and post quantum crypto algorithms, against SCA attack and development of countermeasures to protect the cryptographic implementation.
Utilisation of generic SCA countermeasures would benefit critical sectors. SETS is exploring the security properties of generic countermeasures that protect the cryptographic module.
SETS is establishing a hardware test lab infrastructure to evaluate the software exploitable hardware vulnerabilities
SETS has expertise in examining implementation mechanisms of PUF and design practices to achieve scalable, efficient and secure PUF-based cryptographic schemes. In addition, SETS has developed True Random Number Generator (TRNG) using PUF and developed a tool to test the performance of TRNG.
SETS has collaborated with National level organisations to work on the analysis of their crypto modules against Side Channel Attacks and development of FIPS-140-2 compliant crypto modules for indigenous HSM. SETS has ongoing engagement with IIT-Bombay, IIT-Delhi and SCL-Chandigarh in the development of PUF based technologies of national importance.
SETS has established differential power and Electro-Magnetic measurement and analysis set-up on Field Programmable Gate Array (FPGA) and micro-controller to conduct side channel analysis. Using the set-up, various types of crypto modules have been evaluated and appropriate countermeasures have also been developed
Side-channel analysis (SCA) is demonstrated to be an effective way to recover secret keys stored in cryptographic ICs by observing and recording its power consumption. SETS is capable of performing vulnerability analysis of symmetric (such as stream and block ciphers and authenticated encryption schemes), asymmetric key ciphers (RSA, DSA, ECC) and post quantum crypto algorithms, against SCA attack and development of countermeasures to protect the cryptographic implementation.
Utilisation of generic SCA countermeasures would benefit critical sectors. SETS is exploring the security properties of generic countermeasures that protect the cryptographic module.
SETS is establishing a hardware test lab infrastructure to evaluate the software exploitable hardware vulnerabilities
SETS has expertise in examining implementation mechanisms of PUF and design practices to achieve scalable, efficient and secure PUF-based cryptographic schemes. In addition, SETS has developed True Random Number Generator (TRNG) using PUF and developed a tool to test the performance of TRNG.
SETS has collaborated with National level organisations to work on the analysis of their crypto modules against Side Channel Attacks and development of FIPS-140-2 compliant crypto modules for indigenous HSM. SETS has ongoing engagement with IIT-Bombay, IIT-Delhi and SCL-Chandigarh in the development of PUF based technologies of national importance.
SETS has established differential power and Electro-Magnetic measurement and analysis set-up on Field Programmable Gate Array (FPGA) and micro-controller to conduct side channel analysis. Using the set-up, various types of crypto modules have been evaluated and appropriate countermeasures have also been developed
Copyright 2018 © SETS | ALL Rights Reserved | Last Updated: Friday, 22-Feb, 2019.
Copyright 2018 © SETS | ALL Rights Reserved