• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
MEST Center

MEST Center

National Microelectronic Security Training Center

  • Home
  • About Us
    • Highlights
    • Advisory Board
    • Diversity and Inclusion Statement
    • Careers
  • Contributors
  • Trainings & Schedule
    • Join us on nanoHUB!
    • Webinars
    • On-Site and Virtual Training
    • On-Campus Training
    • Certificate Programs
      • Micro Certificates
      • Macro Certificates
    • Courses
    • Modules
  • Contact Us

M2.C: Pre-silicon power side channel Assessment

May 1, 2022 by Limor Herb


Objective: In this module, trainees will learn how to extract secret keys from AES using profiling and non-profiling side channel attacks with power modality. Trainees will be provided with two types of SPICE netlists (i) power traces from unprotected AES; (ii) power traces from more secure AES, and (iii) scripts of DPA and CPA attacks. Trainees will use the provided scripts on these netlists to compare the performance of non-profiling attacks before and after synchronization. A machine learning classifier will be trained and used to recover the key.

Target Audience: Government officers, Scientists

Prerequisite Knowledge and Skills:

  • programming knowledge: Verilog HDL
  • Xilinx Vivado softwares
  • basic knowledge of AES cipher

Resources Provided at the Training | Deliverables:

  • Detailed description of set-ups used in training
  • A video demo of the module
  • Verilog, python scripts examples for analysis

Learning Outcome: By the end of this course and experiment, trainees will learn how to extract secret keys from AES using profiling and non-profiling side channel attacks with power modality.

Stay in touch!

Join our LISTSERV

Join us on nanoHUB

  • LinkedIn
  • Email MEST Center
  • Join us on nanoHUB!