Top Tutors
The team is composed solely of exceptionally skilled graduate writers, each possessing specialized knowledge in specific subject areas and extensive expertise in academic writing.
Click to fill the order details form in a few minute.
Posted: August 5th, 2022
Introduction to Hardware Security Assignment 2
General Instructions:
• Only electronic submissions will be accepted.
• Late submissions will have penalties.
• Any sort of plagiarism will be penalised. If you are referring to any materials online or books, please cite them accordingly otherwise it will be considered as plagiarism.
• Please submit a detailed report explaining how you have solved the assignment.
Question
In this assignment, you will be provided with the power consumption of the last round of AES. The power traces are obtained from SAKURA-G platform that runs an implementation of AES-128 on a Spartan-6FPGA. Thepower traceis storedinaCSVfile, where eachrow indicatesthe powerconsumption of one AES execution. For every row, the first entry is plaintext, the second entry is ciphertext, and all the subsequent entries are power consumption values. Your task is to write a code for Correlation Power Attack, and use that code on the given power trace to recover the target byte assigned to your group. The target byte assignment for the groups are given below:
• Group 1: 1st byte
• Group 2: 2nd byte
• Group 3: 3rd byte
• Group 4: 5th byte
• Group 5: 6th byte
• Group 6: 7th byte
• Group 7: 9th byte
• Group 8: 10th byte
• Group 9: 11th byte
1
• Group 10: 13th byte
An example code that obtains the 0th byte of the key is provided for your reference. We would like to thank Prof. Debdeep Mukhopadhyay of IIT Kharagpur for kindly providing us the power traces of FPGA based AES implementation.
Deliverables:
1. Even though you are working in group, you need to submit solutions individually.
2. The solution for the assignment should be submitted as a zip file. The file should be named as StudentNameRollNumber.zip.
3. The submission should contain the following:
• A python file.
• The report (as pdf).
We prioritize delivering top quality work sought by students.
The team is composed solely of exceptionally skilled graduate writers, each possessing specialized knowledge in specific subject areas and extensive expertise in academic writing.
Our writing services uphold the utmost quality standards while remaining budget-friendly for students. Our pricing is not only equitable but also competitive in comparison to other writing services available.
Guaranteed Plagiarism-Free Content: We assure you that every product you receive is entirely free from plagiarism. Prior to delivery, we meticulously scan each final draft to ensure its originality and authenticity for our valued customers.
When you decide to place an order with Dissertation Help, here is what happens:
Place an order in 3 easy steps. Takes less than 5 mins.