Power Analysis Attack on Implementation of DES

被引:0
|
作者
Putra, Septafiansyah Dwi [1 ,2 ]
Ahmad, Adang Suwandi [1 ]
Sutikno, Sarwono [1 ]
机构
[1] Inst Teknol Bandung, Sch Elect Engn & Informat, Bandung, Indonesia
[2] Politekn Negeri Lampung, Management Informat, Lampung, Indonesia
关键词
Secure device; SCA; Threats; KGS; DPA; Cryptography;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper discusses the needs and security threats on an embedded system on the current information era. This paper provides security view information on the hardware by looking at aspects of threats, vulnerabilities, encryption and decryption, and information attack side. This paper also describes the KGS (knowledge growing system) as techniques for the prevention of dpa attacks and other power analysis in algorithm cryptography to be used in future research plans.
引用
收藏
页数:6
相关论文
共 50 条
  • [2] Power Analysis Attack of an AES GPU Implementation
    Chao Luo
    Yunsi Fei
    Liwei Zhang
    A. Adam Ding
    Pei Luo
    Saoni Mukherjee
    David Kaeli
    Journal of Hardware and Systems Security, 2018, 2 (1) : 69 - 82
  • [3] Power-analysis attack on an ASIC AES implementation
    Örs, SB
    Gürkaynak, F
    Oswald, E
    Preneel, B
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 546 - 552
  • [4] Implementation of a decoupling based power analysis attack countermeasure
    Mayhew, Matthew
    Muresan, Radu
    IET CIRCUITS DEVICES & SYSTEMS, 2016, 10 (06) : 528 - 535
  • [5] VLSI implementation of an AES algorithm resistant to differential power analysis attack
    Zhao, Jia
    Han, Jun
    Zeng, Xiaoyang
    Chen, Jun
    ASICON 2007: 2007 7TH INTERNATIONAL CONFERENCE ON ASIC, VOLS 1 AND 2, PROCEEDINGS, 2007, : 838 - 841
  • [6] Correlation power analysis attack on software implementation of TRIVIUM stream cipher
    De Silva, Rangana
    Navarathna, Iranga
    Kumarasiri, Malitha
    Chuah, Chai Wen
    Alawatugoda, Janaka
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 19 (3-4) : 379 - 401
  • [7] Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs
    Luo, Pei
    Fei, Yunsi
    Fang, Xin
    Ding, A. Adam
    Leeser, Miriam
    Kaeli, David R.
    2014 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS (RECONFIG), 2014,
  • [8] A Novel Power Analysis Attack against CRYSTALS-Dilithium Implementation
    Liu, Yong
    Liu, Yuejun
    Zhou, Yongbin
    Gao, Yiwen
    Qiao, Zehua
    Wang, Huaxin
    IEEE EUROPEAN TEST SYMPOSIUM, ETS 2024, 2024,
  • [9] Implementation of power attack analysis in ML algorithm circuit with elliptic curve cryptosystems
    Han, Yu
    Zou, Xuecheng
    Liu, Zhenglin
    Dan, Yongping
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2009, 37 (02): : 21 - 24
  • [10] Differential Power Analysis Attack on ARM based AES Implementation without Explicit Synchronization
    Petrvalsky, Martin
    Drutarovsky, Milos
    Varchola, Michal
    2014 24TH INTERNATIONAL CONFERENCE RADIOELEKTRONIKA (RADIOELEKTRONIKA 2014), 2014,