Although each new approach and scientific progress brings many advantages and innovations, its disadvantages should be comprehensively addressed from different perspectives. One of the most striking examples of this is artificial intelligence algorithms. Artificial intelligence algorithms reveal many useful information in the process of extracting information from data. However, information extraction approaches from a cryptanalyst perspective allow obtaining various confidential information for the cryptanalysis of an encryption algorithm. One of the most common of these attack techniques is side-channel analysis. It has been shown in various studies that the secret key of the algorithm can be obtained from the deterministic structure of an encryption algorithm in side-channel attacks. In this study, firstly, it is shown step by step how to perform side channel analysis of AES, which is the latest block cipher algorithm standard. First of all, information on how to do the hardware implementation (implementation) of the AES algorithm is shared. Then, it is shown step by step how the side channel attack is carried out.
Another important contribution of the thesis is to investigate how the resistance of encryption algorithms against side channel attacks will be affected when a noise source is added to mathematically based block cipher algorithms. In this context, the effects of chaotic entropy sources on side channel attacks were analyzed by replacing mathematically based sbox structures with chaos based sbox structures. In the thesis study, for the first time, side channel analyzes of all chaos-based sbox structures available in the literature in the AES block cipher algorithm were performed. The obtained outputs revealed that the side channel analysis results can also be used as an evaluation metric for chaos-based sbox structures. By combining the results obtained from this point of view, a new attack scenario that can be used in the evaluation process of the security analysis of chaos-based image encryption algorithms is also proposed within the scope of this thesis. The results obtained showed that the approaches in the field of information extraction should be considered more comprehensively in the cryptanalysis processes, and also pointed out how necessary it is to analyze a new evaluation criterion for the chaos-based design studies to be carried out in the future. |