Power Analysis Attack on Implementation of DES

被引:0
|
作者
Putra, Septafiansyah Dwi [1 ,2 ]
Ahmad, Adang Suwandi [1 ]
Sutikno, Sarwono [1 ]
机构
[1] Inst Teknol Bandung, Sch Elect Engn & Informat, Bandung, Indonesia
[2] Politekn Negeri Lampung, Management Informat, Lampung, Indonesia
关键词
Secure device; SCA; Threats; KGS; DPA; Cryptography;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper discusses the needs and security threats on an embedded system on the current information era. This paper provides security view information on the hardware by looking at aspects of threats, vulnerabilities, encryption and decryption, and information attack side. This paper also describes the KGS (knowledge growing system) as techniques for the prevention of dpa attacks and other power analysis in algorithm cryptography to be used in future research plans.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] The impacts of the sampling resistance on the power analysis attack
    Chen, Ai-dong
    Journal of Convergence Information Technology, 2012, 7 (16) : 53 - 59
  • [32] Correlation Power Analysis on KASUMI: Attack and Countermeasure
    Gupta, Devansh
    Tripathy, Somanath
    Mazumdar, Bodhisatwa
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2018, 2018, 11348 : 142 - 156
  • [33] Differential Power Analysis Attack and Countermeasures on MCrypton
    Wang, Sixiang
    Cui, Qi
    Gao, Xianwei
    Zhang, Lei
    Duan, Xiaoyi
    PROCEEDINGS OF 2016 IEEE ADVANCED INFORMATION MANAGEMENT, COMMUNICATES, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IMCEC 2016), 2016, : 167 - 172
  • [34] A simple power analysis attack on a McEliece cryptoprocessor
    Molter, H. Gregor
    Stottinger, Marc
    Shoufan, Abdulhadi
    Strenzke, Falko
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (01) : 29 - 36
  • [35] Implementation and Analysis of EDFA Gain Competition Attack in Optical Network
    Liao Xiaomin
    Lin Chushan
    Zhang Yinfa
    Gao Mei
    Shao Yunfei
    PROCEEDINGS 2015 SIXTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND ENGINEERING APPLICATIONS ISDEA 2015, 2015, : 445 - 447
  • [36] Electromagnetic analysis attack on an FPGA implementation of an elliptic curve cryptosystem
    De Mulder, E
    Buysschaert, P
    Örs, SB
    Delmotte, P
    Preneel, B
    Vandenbosch, G
    Verbauwhede, I
    EUROCON 2005: THE INTERNATIONAL CONFERENCE ON COMPUTER AS A TOOL, VOL 1 AND 2 , PROCEEDINGS, 2005, : 1879 - 1882
  • [37] A Weighted Statistical Analysis of DPA Attack on an ASIC AES Implementation
    Qian, Guoyu
    Zhou, Ying
    Xing, Yueying
    Fan, Yibo
    Tsunoo, Yukiyasu
    Goto, Satoshi
    2009 IEEE 8TH INTERNATIONAL CONFERENCE ON ASIC, VOLS 1 AND 2, PROCEEDINGS, 2009, : 906 - +
  • [38] Cache based AES attack implementation and its theoretical analysis
    Zhang, Suiyu
    Han, Jun
    Lu, Shiting
    Zeng, Xiaoyang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2011, 48 (06): : 955 - 963
  • [39] Differential power analysis attack and power consumption model for cryptographic system
    Department of Computer Engineering, Ordnance Engineering College, Shijiazhuang 050003, China
    Huazhong Ligong Daxue Xuebao, 2008, 6 (18-21):
  • [40] An improvement of Davies' attack on DES
    Biham, E
    Biryukov, A
    JOURNAL OF CRYPTOLOGY, 1997, 10 (03) : 195 - 205