Side-Channel Analysis Software
Our side-channel analysis (SCA) software tool can easily quantify and qualify an Advanced EncryptionStandard (AES) hardware from side-channel leakages such as power and electromagnetic (EM) parameters. It is part of the Side-Channel Attack Stater Kit we offer together with a wide range of commercially available FPGA Evaluation Boards and support tools.
KEY FEATURES
Graphical-User-Interface (GUI)
Ease of Use
Fast analysis and pre-qualification
Applicable to AES
Applicable to both simulation & measurement data
SCA for power and electromagnetic (EM) method
State-of-the art attacks – Correlation Power Analysis, Differential Power Analysis, and Machine Learning
Configurable points of attack
Configurable power models (Hamming Weight, Hamming Distance, Weight Model, Bit Model, Zero Model, etc.)
Trace management
Pre-analysing, pre-processing and digital signal processing features available
Data acquisition possible
FPGA hardware evaluation board available
Trace management
Technical support available
Feature Packages
We offer three different packages, as depicted in table below, for different users. The basic package is mainly for students/beginners to learn the principle/concepts of SCA. The advanced packageis mainly for users who would like to have relatively comprehensive SCA evaluations on their hardware for pre-qualification. The professional package is mainly for users who would like to have all-rounded SCA evaluations on their hardware for complete pre-qualification.
- Suitable for Students/Beginners
- Suitable for Comprehensive SCA Evaluations
- Suitable for All-Rounded SCA Evaluations
No | Features | Basic | Advanced | Professional | |
---|---|---|---|---|---|
1 | Software Basic Feature | ||||
|
Yes | Yes | Yes | ||
|
Limited | Unlimited | Unlimited | ||
2 | Data Management Features | ||||
|
Yes | Yes | Yes | ||
3 | Digital Signal Processing Features | ||||
|
Yes | Yes | Yes | ||
|
No | Yes | Yes | ||
4 | Pre-analysing Features | ||||
|
No | Yes | Yes | ||
|
No | Yes | Yes | ||
5 | Pre-processing Features | ||||
|
No | Yes | Yes | ||
|
No | No | Yes | ||
|
No | Yes | Yes | ||
6 | Attack Models | ||||
|
Yes | Yes | Yes | ||
|
Yes | Yes | Yes | ||
|
No | Yes | Yes | ||
|
Yes | Yes | Yes | ||
|
No | Yes | Yes | ||
|
No | No | Yes | ||
|
No | No | Yes | ||
|
No | No | Yes | ||
7 | Result Display | ||||
|
Yes | Yes | Yes |