Organizer: | Prof. Dr. Heiko Mantel | |
Assistants: | Tobias Hamann Damien Marion |
|
Form: | Lab Course (P4) - 6CP |
|
Language: | English | |
Weekly meeting: | Tuesday 11:40-13:20 (S101/A2) |
|
Registration: | in TUCaN (course id 20-00-1090-pr) | |
Preparation meeting (online): | Thursday, 23.4.2020, at 16:00 please register for the course via TUCaN or write a short e-mail to kickoff-2020@mais.informatik.tu-darmstadt.de to receive information via e-mail how to join the preparation meeting. please register by Thursday, 23.4.2020, 12:00 |
|
Workload: | Separate assignment sheets, no single monolithic project |
Side channels are communication channels based on execution characteristics that were not meant to be used for communication. Characteristics that underly side channels include execution time, power consumption, and electromagnetic emission. Side channels are known to be serious threats for cryptography implementations for many years. Technological improvements usually come with new possibilities for
side-channel attacks. For instance, the Internet of Things increased the targetable devices and made the threat more relevant than before.
The lab covers the steps necessary to mount side-channel attacks against cryptographic implementations, to recover secret information, and how to mitigate such vulnerabilities:
Knowledge of Computer Science and Mathematics, equivalent to the first four semesters in the Computer Science Bachelor program, in particular programming skills.
Last modified on 27 August 2020.