A Software Power Analysis Countermeasure Using Secrete Intermediate Key
نویسندگان
چکیده
منابع مشابه
Threshold Implementation as a Countermeasure against Power Analysis Attacks
One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...
متن کاملSupporting Software Fault Tree Analysis Using a Key Node Metric
Design-time use of software fault tree analysis allows designers to focus on safety critical system aspects early in the software development process. This paper presents a technique for evaluating the impact of software fault tree 'key nodes' requiring multiple inputs to fail before the hazard propagates through the system. A heuristics-based key node metric providing a design tool with which ...
متن کاملAn Improved and Efficient Countermeasure against Power Analysis Attacks
Recently new types of differential power analysis attacks (DPA) against elliptic curve cryptosystems (ECC) and RSA systems have been introduced. Most existing countermeasures against classical DPA attacks are vulnerable to these new DPA attacks which include refined power analysis attacks (RPA), zero-value point attacks (ZPA), and doubling attacks. The new attacks are different from classical D...
متن کاملanalysis of power in the network society
اندیشمندان و صاحب نظران علوم اجتماعی بر این باورند که مرحله تازه ای در تاریخ جوامع بشری اغاز شده است. ویژگیهای این جامعه نو را می توان پدیده هایی از جمله اقتصاد اطلاعاتی جهانی ، هندسه متغیر شبکه ای، فرهنگ مجاز واقعی ، توسعه حیرت انگیز فناوری های دیجیتال، خدمات پیوسته و نیز فشردگی زمان و مکان برشمرد. از سوی دیگر قدرت به عنوان موضوع اصلی علم سیاست جایگاه مهمی در روابط انسانی دارد، قدرت و بازتولید...
15 صفحه اولA Proposition to Enhance a Countermeasure Scheme against Power Analysis Attack for AES
The central thing of an AES implementation secure against power analysis attacks is to protect the only nonlinear transformation, SubBytes. Z. Liu proposed a hardware implementation of SubBytes based on random permutation of all the bytes of the State and heterogeneous S-boxes. So the power consumption of this circuit is randomized and power analysis attack is thwarted. This paper points out th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Institute of Information and Communication Engineering
سال: 2013
ISSN: 2234-4772
DOI: 10.6109/jkiice.2013.17.12.2883