There's a degree of electronics twiddling necessary for this. You start with:-

A stiff power supply passing through a shunt resistor is typically used, which is then monitored with a storage oscilloscope. A low resistance is necessary, say 0.1 Ohms, but that really depends on the operating point consumption of your sensor device. You can't have the power supply dipping below operational thresholds as that will nullify the experiment. Control the device to perform your required operations, and you'll read a voltage off the scope. Then simply $consumption = \frac{voltage}{resistance}$.
This is called power analysis, and Wiki has an entry level article. You'll see from the graphic on the RHS that the power signature is not really as simple as I implied. That's where a lot of statistics and probability matching will become necessary. Some don't even bother with power consumption (amps) calculations and go with purely graphical approaches. A wibbly waveform might indicate a correct key, and a wobbly waveform might indicate a bad key. This part is entirely characteristic of the individual device under test. And how you intend to exactly distinguish various cryptographic operations within the sensors.
Also one of the challenges will be in managing to grab and isolate the power consumption at the point of cryptographic operation, rather than simply running the status LEDs. You may need additional wiring between the control inputs and the oscilloscope's trigger input.
But it's a start...