Side-Channel Analysis Software


Side-Channel Analysis Software


Our side-channel analysis (SCA) software tool can easily quantify and qualify an Advanced EncryptionStandard (AES) hardware from side-channel leakages such as power and electromagnetic (EM) parameters. It is part of the Side-Channel Attack Stater Kit we offer together with a wide range of commercially available FPGA Evaluation Boards and support tools.



KEY FEATURES

Graphical-User-Interface (GUI)

Ease of Use

Fast analysis and pre-qualification

Applicable to AES

Applicable to both simulation & measurement data

SCA for power and electromagnetic (EM) method

State-of-the art attacks – Correlation Power Analysis, Differential Power Analysis, and Machine Learning

Configurable points of attack

Configurable power models (Hamming Weight, Hamming Distance, Weight Model, Bit Model, Zero Model, etc.)

Trace management

Pre-analysing, pre-processing and digital signal processing features available

Data acquisition possible

FPGA hardware evaluation board available

Trace management

Technical support available

Feature Packages

We offer three different packages, as depicted in table below, for different users. The basic package is mainly for students/beginners to learn the principle/concepts of SCA. The advanced packageis mainly for users who would like to have relatively comprehensive SCA evaluations on their hardware for pre-qualification. The professional package is mainly for users who would like to have all-rounded SCA evaluations on their hardware for complete pre-qualification.

Basic
  • Suitable for Students/Beginners
Advanced
  • Suitable for Comprehensive SCA Evaluations
Professional
  • Suitable for All-Rounded SCA Evaluations

No Features Basic Advanced Professional
1 Software Basic Feature
  • Graphic User Interface
  • Yes Yes Yes
  • Trace Limit
  • Limited Unlimited Unlimited
    2 Data Management Features
  • Select, Delete, Split
  • Yes Yes Yes
    3 Digital Signal Processing Features
  • Moving average
  • Yes Yes Yes
  • Frequency transformation (for Frequency Attack)
  • No Yes Yes
    4 Pre-analysing Features
  • Signal-to-noise (SNR) analysis
  • No Yes Yes
  • SNR analysis for mask
  • No Yes Yes
    5 Pre-processing Features
  • Trace alignment/resynchronization
  • No Yes Yes
  • Trace re-transformation
  • No No Yes
  • Normalization
  • No Yes Yes
    6 Attack Models
  • First round/last Round (on AES)
  • Yes Yes Yes
  • CPA with Hamming Distance (HD) & Hamming Weight (HW)
  • Yes Yes Yes
  • CPA with bit-wise HW, Weight, Zero-Value
  • No Yes Yes
  • Basic DPA
  • Yes Yes Yes
  • Advanced DPA
  • No Yes Yes
  • 2nd order CPA (HD, HD, bit-wise HW, Weight, Zero-Value)
  • No No Yes
  • 2nd order CPA parameters (Absolute Difference, Difference,Sum, Square of Sum, Product)
  • No No Yes
  • Machine Learning
  • No No Yes
    7 Result Display
  • Correct/Wrong key display, time-domain result display,minimum-to-disclosure display
  • Yes Yes Yes