Power Analysis Attack on Implementation of DES

被引:0
|
作者
Putra, Septafiansyah Dwi [1 ,2 ]
Ahmad, Adang Suwandi [1 ]
Sutikno, Sarwono [1 ]
机构
[1] Inst Teknol Bandung, Sch Elect Engn & Informat, Bandung, Indonesia
[2] Politekn Negeri Lampung, Management Informat, Lampung, Indonesia
关键词
Secure device; SCA; Threats; KGS; DPA; Cryptography;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper discusses the needs and security threats on an embedded system on the current information era. This paper provides security view information on the hardware by looking at aspects of threats, vulnerabilities, encryption and decryption, and information attack side. This paper also describes the KGS (knowledge growing system) as techniques for the prevention of dpa attacks and other power analysis in algorithm cryptography to be used in future research plans.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] An improvement of Davies’ attack on DES
    Eli Biham
    Alex Biryukov
    Journal of Cryptology, 1997, 10 : 195 - 205
  • [42] Are QCA Cryptographic Circuits Resistant to Power Analysis Attack?
    Liu, Weiqiang
    Srivastava, Saket
    Lu, Liang
    O'Neill Nee Mcloone, Maire
    Swartzlander, Earl E., Jr.
    IEEE TRANSACTIONS ON NANOTECHNOLOGY, 2012, 11 (06) : 1239 - 1251
  • [43] Securing Embedded Systems from Power Analysis Attack
    Rani, Deevi Radha
    Venkateswarlu, S.
    Mandhala, Venkata Naresh
    Kim, Tai-hoon
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (06): : 11 - 18
  • [44] Research on Correlation Power Analysis Attack against Piccolo
    Wang, C. (wangchenxu@hit.edu.cn), 1600, Harbin Institute of Technology (45):
  • [45] A Power Analysis Attack Countermeasure Based on Random Execution
    Chen, Shenghua
    Ge, Wei
    Yang, Jinjiang
    Liu, Bo
    Yang, Jun
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1474 - 1479
  • [46] Application of adaptive filter in correlation power analysis attack
    Zhang L.
    Fang H.
    Wang J.
    Duan X.
    Fang X.
    Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument, 2018, 39 (02): : 108 - 115
  • [47] Enhanced Correlation Power Analysis Attack on Smart Card
    Li, Huiyun
    Wu, Keke
    Peng, Bo
    Zhang, Yiwei
    Zheng, Xinjian
    Yu, Fengqi
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2143 - +
  • [48] Hierarchical power analysis attack for falsification detection cipher
    Yoshikawa, Masaya
    Nozaki, Yusuke
    2017 IEEE 7TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE IEEE CCWC-2017, 2017,
  • [49] An Improved Empirical Mode Decomposition for Power Analysis Attack
    Han Gan
    Hongxin Zhang
    Muhammad Saad khan
    Xueli Wang
    Fan Zhang
    Pengfei He
    中国通信, 2017, 14 (09) : 94 - 99
  • [50] Resilience Analysis of Power Grids Under the Sequential Attack
    Zhu, Yihai
    Yan, Jun
    Tang, Yufei
    Sun, Yan
    He, Haibo
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (12) : 2340 - 2354