期刊名称:TELKOMNIKA (Telecommunication Computing Electronics and Control)
印刷版ISSN:2302-9293
出版年度:2019
卷号:17
期号:3
页码:1282-1289
DOI:10.12928/telkomnika.v17i3.9384
出版社:Universitas Ahmad Dahlan
摘要:Cryptography is a science of creating a secret message and it is constantly developed.
The development consists of attacking and defending the cryptography itself. Power analysis is one of
many Side-Channel Analysis (SCA) attack techniques. Power analysis is an attacking technique that uses
the information of a cryptographic hardware’s power consumption. Power analysis is carried on by utilizing
side-channel information to a vulnerability in a cryptographic algorithm. Power analysis also uses a
mathematical model to recover the secret key of the cryptographic device. This research uses design
research methodology as a research framework started from research clarification to descriptive study. In
this research, power analysis attack is implemented to three symmetrical cryptographic algorithms: DES
(Data Encryption Standard), AES (Advanced Encryption Standard), and BC3 (Block Cipher 3). The attack
has successfully recovered 100% of AES secret key by using 500 traces and 75% DES secret key by
using 320 traces. The research concludes that the power analysis attack using Pearson Correlation
Coefficient (PCC) method produces more optimal result compared to a difference of means method.
其他摘要:Cryptography is a science of creating a secret message and it is constantly developed. The development consists of attacking and defending the cryptography itself. Power analysis is one of many Side-Channel Analysis (SCA) attack techniques. Power analysis is an attacking technique that uses the information of a cryptographic hardware’s power consumption. Power analysis is carried on by utilizing side-channel information to a vulnerability in a cryptographic algorithm. Power analysis also uses a mathematical model to recover the secret key of the cryptographic device. This research uses design research methodology as a research framework started from research clarification to descriptive study. In this research, power analysis attack is implemented to three symmetrical cryptographic algorithms: DES (Data Encryption Standard), AES (Advanced Encryption Standard), and BC3 (Block Cipher 3). The attack has successfully recovered 100% of AES secret key by using 500 traces and 75% DES secret key by using 320 traces. The research concludes that the power analysis attack using Pearson Correlation Coefficient (PCC) method produces more optimal result compared to a difference of means method.