Security in Integrated Circuit 
Security in Software 
Our Solutions 
Company 
Blog
Contact us
eShard
/
Security in Integrated Circuit
/
Side Channel

Side Channel

Unintended emissions or leakage such as electromagnetic radiation or fluctuations in a devices power line can fuel a class of dangerous and worrisome attacks potentially compromising the cryptographic material at the very heart of the device’s security.

Qualifying your cryptography against side-channel attacks

Side-channel attacks were initially only targeted towards Smart Cards but are now being increasingly targeted towards complex System on Chip (SoC) devices.

Qualifying a product or solution against side-channel attack will require:

  • A measurement bench with the ability to collect valuable information,
  • A software platform able to manage heavy computation with flexibility
  • Hands-on expertise on and knowledge of multiple variants of attacks

SCA measurement bench

A professional side-channel measurement bench needs to combine different assets. eShard has been developing this hardware after years of practice:

  • A good ergonomy and ability to set different probes
  • Automated XY stage for scanning and reproducibility
  • An observation camera to control the location of the probe

Software platform

It is necessary to perform the whole side-channel experimental flow on the same platform from the data collection to the statistical analyses. esDynamic is the scientific platform that offers the perfect technology to power side channel anlyses with a lot of flexibility and the ability to compute high volumes of data.

  • Manage the trace collection: from the source to the data center
  • Create cartography of the leakage detection
  • Perform data processing, such as the trace alignment
  • Process side-channel statistics with efficient computation
Learn more about esDynamic

eShard's expertise right in your lab

Side-channel is the fruit of more than 20 years of research. As a result, most of the cryptographic algorithms and their implementations into chips are subject to it. This is therefore necessary to get a good understanding of all kinds of attacks and their variants. With esDynamic and the specialized modules, we reconcile the know and the how into a unique know-how technical and dynamic content: attacks are described, can be replayed and adapted to your use case.

  • Catalogues of attack including the latest developments: Side-channel advanced, Deep Learning Side-channel, Scatter and SM.X
  • Specialized libraries optimised for fast computation
  • Widgets to make analyses more visual

Starter Kits

Practical expertise can make the difference when successfully undertaking a side-channel attack. From theory to practice, there is a lot to learn. Starter Kit is a real use case demonstrating all practical aspects of a successful side-channel analysis on recent devices: from the bench setup to the secret key exhibition. The hardware kit is delivered with the data traces and the dynamic content.

Our catalogue includes different use cases including:

  • Side-channel attack targeting an hardware implementation of an AES
  • Side-channel attack targeting an ECDSA

Expertise is something that you need to farm

Very few experts are fully knowledgeable in the side-channel attacks. Regardless if you are a beginner or a proficient professional, our comprehensive catalogue of side-channel modules will help you to increase your knowledge.

  • Individual, online and practical,
  • One of our experts will coach you during these learning by doing sessions.
  • Access to esDynamic platform on the cloud
  • Data set are provided
  • Set of modules for experts or beginners

Our specialized lab

Our team of experts is available for specialized side-channel audits. They have long track records in practical side-channels in black box or grey box on different kinds of devices: System on Chips (SoC), secure controllers, FPGA. Our experts combined with our local infrastructure lead to best in class side-channel evaluations. Our recent works included:

  • Side-channel analysis of a PUF implementation
  • Side-channel analysis of a secure controller implementing a signature protocol
  • Side-channel analysis to stress a crypto processor on a SoC device

Interested?

Contact us

Blog Articles

Software Security

The Bluetooth smart lock which spoke too much

6 min read
Edit by Vinet Guillaume Jun 8, 2020
© eShard 2021. All rights reserved
Privacy policy | Legal Notice
Bâtiment GIENAH
11 avenue de Canteranne
33600 PESSAC
France
7 rue Gaston de Flotte
13012 MARSEILLE
France
#04-01 Paya Lebar Quarter
1 Paya Lebar Link
SINGAPORE 408533
eShard GmbH
Lebacher Str. 4
66113 Saarbrücken
Allemagne