Lab: Side Channel

Organizer: Prof. Dr. Heiko Mantel
Assistants: Tobias Hamann
Damien Marion

Form: Lab Course (P4) - 6CP
Language: English
Weekly meeting: Tuesday 11:40-13:20  (S101/A2)
Registration: in TUCaN (course id 20-00-1090-pr)
Preparation meeting (online): Thursday, 23.4.2020, at 16:00
please register for the course via TUCaN or write a short e-mail to to receive information via e-mail how to join the preparation meeting.
please register by Thursday, 23.4.2020, 12:00
Workload: Separate assignment sheets, no single monolithic project


Information regarding the Corona pandemic:
This course will happen. In the beginning of the summer semester 2020, this course will be taught online. We closely monitor the situation and adapt the format of this course accordingly throughout the semester. The official start of this course is the online preparation meeting on Thursday, 23.4.2020, at 16:00, in which you will receive more information about this course's format. We will provide more information how to join the preparation meeting via e-mail before. To receive this e-mail, please register for this course via TUCaN or write an e-mail to

Please register for the preparation meeting by Thursday, 23.4.2020, 12:00

On-line participation in the preparation meeting is required for all labs and seminars. The registration in the courses gets only effective after steps explained in the preparation meeting.



Side channels are communication channels based on execution characteristics that were not meant to be used for communication. Characteristics that underly side channels include execution time, power consumption, and electromagnetic emission. Side channels are known to be serious threats for cryptography implementations for many years. Technological improvements usually come with new possibilities for
side-channel attacks. For instance, the Internet of Things increased the targetable devices and made the threat more relevant than before.

The lab covers the steps necessary to mount side-channel attacks against cryptographic implementations, to recover secret information, and how to mitigate such vulnerabilities:

  • implementation of a cryptographic algorithm (AES),
  • manipulation of power- and time-traces,
  • side-channel leakage model implementation,
  • differential side-channel analysis (CPA and LRA),
  • extraction of secret key from real-word traces,
  • differential side-channel analysis.


Knowledge of Computer Science and Mathematics, equivalent to the first four semesters in the Computer Science Bachelor program,  in particular programming skills.


Last modified on 27 August 2020.

A A A | Print | Imprint | Sitemap | Contact
zum Seitenanfang