{"title":"对DES实现的功率分析攻击","authors":"S. D. Putra, A. S. Ahmad, S. Sutikno","doi":"10.1109/ICITSI.2016.7858246","DOIUrl":null,"url":null,"abstract":"This paper discusses the needs and security threats on an embedded system on the current information era. This paper provides security view information on the hardware by looking at aspects of threats, vulnerabilities, encryption and decryption, and information attack side. This paper also describes the KGS (knowledge growing system) as techniques for the prevention of dpa attacks and other power analysis in algorithm cryptography to be used in future research plans.","PeriodicalId":172314,"journal":{"name":"2016 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Power analysis attack on implementation of DES\",\"authors\":\"S. D. Putra, A. S. Ahmad, S. Sutikno\",\"doi\":\"10.1109/ICITSI.2016.7858246\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper discusses the needs and security threats on an embedded system on the current information era. This paper provides security view information on the hardware by looking at aspects of threats, vulnerabilities, encryption and decryption, and information attack side. This paper also describes the KGS (knowledge growing system) as techniques for the prevention of dpa attacks and other power analysis in algorithm cryptography to be used in future research plans.\",\"PeriodicalId\":172314,\"journal\":{\"name\":\"2016 International Conference on Information Technology Systems and Innovation (ICITSI)\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Information Technology Systems and Innovation (ICITSI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICITSI.2016.7858246\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Information Technology Systems and Innovation (ICITSI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITSI.2016.7858246","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This paper discusses the needs and security threats on an embedded system on the current information era. This paper provides security view information on the hardware by looking at aspects of threats, vulnerabilities, encryption and decryption, and information attack side. This paper also describes the KGS (knowledge growing system) as techniques for the prevention of dpa attacks and other power analysis in algorithm cryptography to be used in future research plans.