Power analysis attack against encryption devices: A comprehensive analysis of AES, DES, and BC3

16Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.

Abstract

Cryptography is a science of creating a secret message and it is constantly developed. The development consists of attacking and defending the cryptography itself. Power analysis is one of many Side-Channel Analysis (SCA) attack techniques. Power analysis is an attacking technique that uses the information of a cryptographic hardware's power consumption. Power analysis is carried on by utilizing side-channel information to a vulnerability in a cryptographic algorithm. Power analysis also uses a mathematical model to recover the secret key of the cryptographic device. This research uses design research methodology as a research framework started from research clarification to descriptive study. In this research, power analysis attack is implemented to three symmetrical cryptographic algorithms: DES (Data Encryption Standard), AES (Advanced Encryption Standard), and BC3 (Block Cipher 3). The attack has successfully recovered 100% of AES secret key by using 500 traces and 75% DES secret key by using 320 traces. The research concludes that the power analysis attack using Pearson Correlation Coefficient (PCC) method produces more optimal result compared to a difference of means method.

Cite

CITATION STYLE

APA

Putra, S. D., Yudhiprawira, M., Sutikno, S., Kurniawan, Y., & Ahmad, A. S. (2019). Power analysis attack against encryption devices: A comprehensive analysis of AES, DES, and BC3. Telkomnika (Telecommunication Computing Electronics and Control), 17(3), 1282–1289. https://doi.org/10.12928/TELKOMNIKA.V17I3.9384

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free