2017 International Symposium on Electronics and Smart Devices (ISESD) 2017
DOI: 10.1109/isesd.2017.8253361
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of BC3 algorithm for differential power analysis attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 16 publications
0
2
0
1
Order By: Relevance
“…As Figure 8 shows, we could obtain the intermediate value modelled as haming weight (8 bit) for every message. In future research, we will try to randomize the intermediate value by using information fusion [23][24][25][26][27][28][29][30][31] and constant weight encoding [27], [32] approach. Those approaches could deceive attackers in recovering AES encryption device's secret key.…”
Section: Discussionmentioning
confidence: 99%
“…As Figure 8 shows, we could obtain the intermediate value modelled as haming weight (8 bit) for every message. In future research, we will try to randomize the intermediate value by using information fusion [23][24][25][26][27][28][29][30][31] and constant weight encoding [27], [32] approach. Those approaches could deceive attackers in recovering AES encryption device's secret key.…”
Section: Discussionmentioning
confidence: 99%
“…Algoritma ini lebih aman terhadap serangan jika dibandingkan dengan algoritma AES. Algoritma AES sangat rentang terhadap serangan correlation power analysis (CPA) [8]. dengan menggunakan persamaan statistik [9], kunci utama AES dapat ditemukan.…”
Section: Pendahuluanunclassified
“…Cryptanalysis is used to crack the key of a block cipher in an unusual way or test the security of a cryptographic algorithm that has been created. Correlation power analysis, for instance, tries to find all of the sub-keys using the correlation between the hamming weights and the power used in the embedded device when calculating the encryption algorithm [7].…”
Section: Introductionmentioning
confidence: 99%