An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms

Authors

  • Alizadeh, Javad Fath Center, Faculty and Research Center of Communication and Information Technology, Imam Hossein University
  • Seddighi, Mohsen Fath Center, Faculty and Research Center of Communication and Information Technology, Imam Hossein University
Abstract:

Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel attack on the with-box cryptography. The mentioned method influenced all with-box cryptography schemes when it was introduced. This attack is based on the software implementation of cryptography algorithms and is similar to the differential power analysis (DPA). In this paper, we introduce the principles of the DCA and also describe how one can use this attack to find the key of a with-box cryptography scheme.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

ترجمه و تحقیق کتاب an introduction to the history of mysticism

پایان نامه ی ارائه شده ترجمه ی کتاب «an introduction to the history of mysticism» نوشته ی مارگارت اسمیت که وی پژوهشگر، خاورشناس و محقق برجسته ی تصوف و عرفان می باشد. موضوع اساسی و مهم این کتاب عرفان در ادیان مختلف است. نویسنده در ابتدا این کلمه را ریشه یابی کرده و سپس تعریفی از آن ارائه داده و آن را در ادیان مختلف مورد بحث قرار داده است و در هر فصل کتاب به معرفی عرفای آن دین یا عصر خاصی پرداخته...

15 صفحه اول

An introduction to the analysis of algorithms

Thank you for downloading an introduction to the analysis of algorithms. Maybe you have knowledge that, people have search hundreds times for their chosen readings like this an introduction to the analysis of algorithms, but end up in infectious downloads. Rather than reading a good book with a cup of tea in the afternoon, instead they juggled with some harmful bugs inside their desktop compute...

full text

the differential effects of debate and media analysis as relate to enhancing efl learners critical thinking ability and writing performances

critical thinking ability has an important role in education. accordingly, scholars around the world are searching for new ways for teaching and improving students critical thinking ability. in line with the studies in efl contexts supporting the positive relationship between critical thinking and writing performances, this study investigated the differential effects of halverson’s critical thi...

15 صفحه اول

On White-Box Cryptography

White-box cryptography techniques are aimed at protecting software implementations of cryptographic algorithms against key recovery. They are primarily used in DRM-like applications as a cost-effective alternative to token-based protections. This paper discusses the relevance of white-box implementations in such contexts as a series of questions

full text

An Introduction to Pairing-Based Cryptography

Bilinear pairings have been used to design ingenious protocols for such tasks as one-round three-party key agreement, identity-based encryption, and aggregate signatures. Suitable bilinear pairings can be constructed from the Tate pairing for specially chosen elliptic curves. This article gives an introduction to the protocols, Tate pairing computation, and curve selection.

full text

Cryptography - an introduction to computer security

Want to get experience? Want to get any ideas to create new things in your life? Read cryptography an introduction to computer security now! By reading this book as soon as possible, you can renew the situation to get the inspirations. Yeah, this way will lead you to always think more and more. In this case, this book will be always right for you. When you can observe more about the book, you w...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 8  issue 2

pages  51- 62

publication date 2020-02

By following a journal you will be notified via email when a new issue of this journal is published.

Keywords

No Keywords

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023