2019
DOI: 10.12928/telkomnika.v17i3.9384
|View full text |Cite
|
Sign up to set email alerts
|

Power analysis attack against encryption devices: a comprehensive analysis of AES, DES, and BC3

Abstract: Cryptography is a science of creating a secret message and it is constantly developed. The development consists of attacking and defending the cryptography itself. Power analysis is one of many Side-Channel Analysis (SCA) attack techniques. Power analysis is an attacking technique that uses the information of a cryptographic hardware's power consumption. Power analysis is carried on by utilizing side-channel information to a vulnerability in a cryptographic algorithm. Power analysis also uses a mathematical mo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 18 publications
0
8
0
1
Order By: Relevance
“…In order to choose appropriate system for an application, there is a need to assess the security of different encryption algorithms used in each encryption category. There are many comparative studies in the literature that have compared these algorithms with respect to number of features such as speed, throughput, computation time, memory usage, size of key and data blocks, and possible attacks. According to a literature reviewed, AES (supported by most of the NoSQL and NewSQL systems) has a better speed and less memory utilization as compared with RSA (used in Cassandra, ClustrixDB, and VoltDB).…”
Section: Comparison and Discussionmentioning
confidence: 99%
“…In order to choose appropriate system for an application, there is a need to assess the security of different encryption algorithms used in each encryption category. There are many comparative studies in the literature that have compared these algorithms with respect to number of features such as speed, throughput, computation time, memory usage, size of key and data blocks, and possible attacks. According to a literature reviewed, AES (supported by most of the NoSQL and NewSQL systems) has a better speed and less memory utilization as compared with RSA (used in Cassandra, ClustrixDB, and VoltDB).…”
Section: Comparison and Discussionmentioning
confidence: 99%
“…On the other hand, the PSNR and SSIM decryption process can be used to measure the perfection of the image decryption process, where the PSNR and SSIM values are infinity and 1 respectively, to get the perfect image decryption. PSNR can be calculated by (6), whereas SSIM can be calculated by (7). ; is a dynamic range (2 − 1) with the default value 1 = 0.01 and 2 = 0.03.…”
Section: Psnr and Ssimmentioning
confidence: 99%
“…At present, many cryptographic algorithms can be used to secure digital files. However, along with the times, cryptographic algorithms must also be developed and maintained to provide better security [5][6][7][8][9]. Cryptographic algorithms that are widely implemented in digital files are AES, DES, RC4, OTP, RSA, and Chaotic Map [4,5,8,[10][11][12][13].…”
Section: Introductionmentioning
confidence: 99%
“…Information security is very important because it supports the performance of e-business systems, in improving services to customers [19]. Cryptography is a technique of making messages or information secret and can only be accessed by authorized users through an encryption process using a mathematical model to recover secret keys from cryptographic devices [20]. This study aims to improve security in the e-business system for rice milling small and medium-sized enterprises (SMEs) by implementing cryptographic algorithms, which can strengthen passwords on user accounts and hide the exchange of transaction information.…”
Section: Introductionmentioning
confidence: 99%