Skip to content

TARUN-1212/EM-SideChannel-Attack-AES128

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

13 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

EM-SideChannel-Attack-AES128

Electromagnetic side-channel analysis of AES-128 on Raspberry Pi 4 using a bare-metal implementation. Key recovery through trace alignment and statistical analysis.

πŸ”’ Bare-Metal AES-128 Side-Channel Attack on Raspberry Pi 4 (DRDO Internship Project)

This project demonstrates an electromagnetic (EM) side-channel attack on a bare-metal implementation of AES-128 encryption, conducted as part of an internship at DRDO’s SAG Lab. The aim was to show the feasibility of recovering secret encryption keys by analyzing EM radiation emitted from a Raspberry Pi 4 during cryptographic operations.


πŸ“Œ Objective

To implement AES-128 encryption in bare-metal C on Raspberry Pi 4, collect EM traces during encryption, and apply statistical side-channel analysis techniques (specifically Correlation Power Analysis, CPA) to extract the secret AES key.


βš™οΈ Hardware and Tools Used

Component Description
Target Raspberry Pi 4 Model B
Probe ELV Elektronik EM Probe Set
Oscilloscope Rigol DS1054Z (for trace capture)
Dev Machine PC running Ubuntu via VirtualBox with GCC-ARM toolchain
Other MicroSD, USB keyboard, monitor, HDMI cable, power supply

🧰 Software Stack

  • Bare-metal C (No OS)
  • GCC ARM Cross-Compiler
  • Python / MATLAB for trace processing
  • CSV format for storing EM traces
  • UART communication (for plaintext/ciphertext transfer)

πŸ“œ Project Structure

About

Electromagnetic side-channel analysis of AES-128 on Raspberry Pi 4 using a bare-metal implementation. Key recovery through trace alignment and statistical analysis.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors