LC Networks Communication

2017 Advanced Side Channel Analysis Training at China Shanghai

2017-02-20

Advanced Side Channel Analysis Training 
Location: China Shanghai
Date: 18-19 May 2017  

Take your side channel analysis skills to the next level with our advanced course. During two days of intense training you prepare for analysing the resilience of advanced crypto implementations with strong countermeasures against side channel analysis. 

This course is aimed at side channel professionals who implement countermeasures and/or security evaluators that use side channels to measure leakage. The course has a good balance of practise and theory and you perform hands-on exercises with real-world targets while understanding the theoretical backgrounds of the attacks. During the practical sessions you work in small groups using our side channel test equipment.

t the end of the training you have a thorough understanding of the commonly applied test methods for high-end cryptographic implementation and you have the skills to apply them on real chip products with strong countermeasures to assess their security strength. The techniques enable you to test the strength of publicly known countermeasures such as masking, key randomization, non-standard and optimized crypto implementations, and random delays. 

While the concepts we teach are generic and can be replicated using different equipment, during the training we use our Riscure Inspector - tool. With Inspector we can effectively demonstrate a wide range of concepts; it is an all-in-one solution, is constantly updated and has state of the art methods.

Key topics:
 Recap fundamentals of Correlation Power Analysis (CPA)
 Perform Template Analysis and Point of Interest selection (on key loading and  symmetric ciphers)
 Implement advanced leakage models
 Detect leakage using T-test
 Assess leakage with TVLA
 DPA on Elliptic Curve signature (ECC Nyberg – Rueppel) with real-time pattern triggering
 Second-order DPA on masked AES implementations
 High-order analysis on an m-ary RSA implementation
 Chosen-plaintext DPA attack on t-table-based AES (e.g. openSSL)

Who should follow this course?
People attending this training should have experience with performing side channel testing in practice. Experience with the Riscure side channel test equipment is useful but not required. 

How to book?
Please contact Mr.Chen (lc@lcnc.com.tw)