Power Analysis Attack on Implementation of DES

被引:0
作者
Putra, Septafiansyah Dwi [1 ,2 ]
Ahmad, Adang Suwandi [1 ]
Sutikno, Sarwono [1 ]
机构
[1] Inst Teknol Bandung, Sch Elect Engn & Informat, Bandung, Indonesia
[2] Politekn Negeri Lampung, Management Informat, Lampung, Indonesia
来源
PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY SYSTEMS AND INNOVATION (ICITSI) | 2016年
关键词
Secure device; SCA; Threats; KGS; DPA; Cryptography;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper discusses the needs and security threats on an embedded system on the current information era. This paper provides security view information on the hardware by looking at aspects of threats, vulnerabilities, encryption and decryption, and information attack side. This paper also describes the KGS (knowledge growing system) as techniques for the prevention of dpa attacks and other power analysis in algorithm cryptography to be used in future research plans.
引用
收藏
页数:6
相关论文
共 28 条
  • [1] [Anonymous], 2005, IACR Cryptology ePrint Archive 2005
  • [2] Anoop MS, 2008, IACR CRYPTOLOGY EPRI
  • [3] Chari S., 1999, Towards Sound Approaches to Counteract Power-Analysis Attacks
  • [4] Collins W. H., 2013, SECURE RECONFIGURABL
  • [5] Eby M, 2007, ECBS 2007: 14TH ANNUAL IEEE INTERNATIONAL CONFERENCE AND WORKSHOPS ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS, P221
  • [6] Godfrey M., 2013, PREVENTING CACHE BAS
  • [7] Reconfigurable hardware for high-security/high-performance embedded systems: The SAFES perspective
    Gogniat, Guy
    Wolf, Tilman
    Burleson, Wayne
    Diguet, Jean-Philippe
    Bossuet, Lilian
    Vaslin, Romain
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2008, 16 (02) : 144 - 155
  • [8] Golic JD, 2002, LECT NOTES COMPUT SC, V2523, P198
  • [9] Gornik A., HARDWARE BASED COUNT
  • [10] Guilley S, 2004, ANN TELECOMMUN, V59, P998