Description
		This bachelor's thesis investigates the temperature dependency of Side-Channel Attacks, focusing on 
a case study involving the Ascon cryptographic algorithm. Side-Channel Attacks are ways of compromising 
the implementation of cryptographic algorithms through observing and exploiting unintended information 
the computing device emits while executing a cryptographic algorithm. They are mostly of interest in the 
world of IoT, where an attacker can easily gain physical access to a victim device. The objective of this 
thesis is to analyse if side-channel attacks can be performed more efficiently for certain temperatures than 
others. The study analyses the power consumption of a computing device performing the cipher Ascon-128a at 
different temperatures ranging from -20°C to +80°C. To be able to make a statement for which temperature a 
side-channel attack would be most efficient, the study measures the Signal-to-Noise Ratio of hamming weight 
leakage during the Ascon initialisation phase for each temperature and compares the results. Through a systematic 
examination, our findings uncover a relation between the temperature and the Signal-to-Noise Ratio of hamming 
weight leakage.
Keywords: side-channel attacks, temperature dependency, Signal-to-Noise Ratio, Ascon 
	       |