4h
A typical SCA evaluation requires a complex end-to-end procedure: an initial leakage assessment stage, an optional dimensionality reduction phase, a signal processing step (e.g., static alignment, filtering, resampling), and finally the application of one or several attack methods.
Recently, deep learning has been introduced as an alternative framework and used successfully as an all-in-one tool for SCA. If you are interested in keeping your knowledge in synch with state-of-the-art SCA methodologies, look no further than our Deep Learning for SCA online training. The goal of this online course is to introduce you to deep learning for side channel analysis.
The goal of this training is to introduce you to deep learning for side channel analysis. After the workshop you will be able to use neural networks to evaluate both private and public key crypto algorithms.
Key learning objectives:
We assume familiarity with basic SCA evaluations. While the concepts we teach are generic and can be replicated using different equipment, during the training we use our Riscure Inspector tool.
You are a security evaluator and would like to take your SCA knowledge to the next level.
Introduction to machine learning for SCA
Deep learning essentials
Extracting cryptographic keys with deep learning
Optimization and automation
Analyzing symmetric crypto algorithm implementations
Remarks and conclusions
Recent developments in the field