Power Analysis Attack on Implementation of DES

被引:0
|
作者
Putra, Septafiansyah Dwi [1 ,2 ]
Ahmad, Adang Suwandi [1 ]
Sutikno, Sarwono [1 ]
机构
[1] Inst Teknol Bandung, Sch Elect Engn & Informat, Bandung, Indonesia
[2] Politekn Negeri Lampung, Management Informat, Lampung, Indonesia
关键词
Secure device; SCA; Threats; KGS; DPA; Cryptography;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper discusses the needs and security threats on an embedded system on the current information era. This paper provides security view information on the hardware by looking at aspects of threats, vulnerabilities, encryption and decryption, and information attack side. This paper also describes the KGS (knowledge growing system) as techniques for the prevention of dpa attacks and other power analysis in algorithm cryptography to be used in future research plans.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Implementation and Analysis of AES, DES and Triple DES on GSM Network
    Sachin, Majithia
    Kumar, Dinesh
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (01): : 298 - 303
  • [22] Design and FPGA Implementation of 3DES against Power Analysis Attacks for IC Bankcard
    Bi, Xiuyuan
    Wu, Liji
    Bai, Guoqiang
    2009 IEEE 8TH INTERNATIONAL CONFERENCE ON ASIC, VOLS 1 AND 2, PROCEEDINGS, 2009, : 159 - 162
  • [23] Enhanced DES implementation secure against high-order differential power analysis in smartcards
    Lv, JQ
    Han, YF
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2005, 3574 : 195 - 206
  • [24] An analysis of Goubin's refined power analysis attack
    Smart, NP
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, 2003, 2779 : 281 - 290
  • [25] Implementation and Analysis of a Practical NFC Relay Attack Example
    Wang, Zhao
    Xu, Zhigang
    Xin, Wei
    Chen, Zhong
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 143 - 146
  • [26] Improved Power Analysis Attack Based on the Preprocessed Power Traces
    Han, Xueyang
    Xu, Qiuliang
    Lin, Fengbo
    Zhao, Minghao
    GREEN, PERVASIVE, AND CLOUD COMPUTING, 2016, 9663 : 278 - 289
  • [27] Power analysis of FPGAs: How practical is the attack ?
    Standaert, RX
    Oldenzeel, LVTO
    Samyde, D
    Quisquater, JJ
    FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2003, 2778 : 701 - 711
  • [28] Power Side Channel Attack Analysis and Detection
    Gattu, Navyata
    Khan, Mohammad Nasim Imtiaz
    De, Asmit
    Ghosh, Swaroop
    2020 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED-DESIGN (ICCAD), 2020,
  • [29] On the Attack of Misaligned Traces by Power Analysis Methods
    Tian, Qizhi
    Huss, Sorin A.
    2012 SEVENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES'2012), 2012, : 28 - 34
  • [30] Countermeasure of TWINE against Power Analysis Attack
    Nozaki, Yusuke
    Asahi, Kensaku
    Yoshikawa, Masaya
    2015 IEEE INTERNATIONAL MEETING FOR FUTURE OF ELECTRON DEVICES, KANSAI (IMFEDK), 2015,