• AI: Deep Learning

    By now, you probably have the feeling why the terminology of neural networks and deep learning is used interchangeably. In fact, the neural network is “learning” the decision boundary based on how many datapoints are classified correctly and how many are classified incorrectly. This is...
    Read more...

  • AI: Learning the Decision Boundary

    Instead of using regular statistics to detect the decision boundary, we can try to learn the function iteratively. This is where neural networks come in handy. By using deep neural networks, we are repeating our statistical analysis iteratively depending on our data. For example, suppose...
    Read more...

  • An introduction to Artificial Intelligence & Data

    Artificial Intelligence, in short AI, is a very broad term with a lot of associations. It is often considered a “black box”, because we are not always how decisions are made by AI. For this blog, I’ll focus on AI from a data science &...
    Read more...

  • AES: the Substitution Box

    One particular part of the AES operation is interesting for a hardware attack. This is the SubBytes operation, where each byte will be substituted with another value using a substitution box (sbox for short). To show how a substitution box works, have a look at...
    Read more...

  • AES: the Inner Workings

    In this post, we are going to zoom in on the inner workings of one AES block. AES operates in rounds, which are usually 10, 12 or 14 rounds (matching with AES-128, AES-192 and AES-256). The output of each round is xor’ed with a subkey,...
    Read more...

  • Introduction to AES: a Block Cipher

    AES (Advanced Encryption Standard) is the NIST-standard for encrypting data and is widely used. AES is a block cipher, which means that the data is encrypted per block. For example, AES-128 denotes that each plaintext is split into blocks of 128 bits and uses a...
    Read more...

  • Hardware: Side Channels

    Side channels are channels on which information is leaked through the physical properties of the device. These side channels can occur in a more technical setting, but also in a general setting. Examples of general side channels are such as the sound of your keyboard...
    Read more...

  • Hardware: The CPU

    The CPU is the computational unit of a computer. It executes a sequence of instructions, which is provided directly or indirectly by the programmer. Instructions are programmed into the CPU and selected at the time when they are needed. The implementation of the instruction set...
    Read more...

  • Introduction to Hardware Security

    The field of hardware security refers to protecting the physical components of a computer. It assumes direct access to the hardware and this field includes anything ranging from managing access control to hardware design. Physical security on your hardware is important, as the hardware can...
    Read more...