ATTACK ON HARDWARE IMPLEMENTATION OF BC3 ENCRYPTION WITH CORRELATION POWER ANALYSIS

<p align="justify">BC3 is encryption algorithm developed by Indonesian researchers, and designed to deal with various analysis such as linear analysis, differential analysis, interpolation attack, etc. However, BC3 had never been tested with an implementation attack, e.g. simple powe...

Full description

Saved in:
Bibliographic Details
Main Author: , Ma'muri
Format: Theses
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/28727
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
id id-itb.:28727
spelling id-itb.:287272018-02-09T15:28:42ZATTACK ON HARDWARE IMPLEMENTATION OF BC3 ENCRYPTION WITH CORRELATION POWER ANALYSIS , Ma'muri Indonesia Theses INSTITUT TEKNOLOGI BANDUNG https://digilib.itb.ac.id/gdl/view/28727 <p align="justify">BC3 is encryption algorithm developed by Indonesian researchers, and designed to deal with various analysis such as linear analysis, differential analysis, interpolation attack, etc. However, BC3 had never been tested with an implementation attack, e.g. simple power analysis (SPA), correlation power analysis (CPA) and so on. Thus, in this research the author would do hardware implementation of the BC3 algorithm in FPGA and then attack this implementation with correlation power analysis. The author used with CW1173 board to capture power consumption. The author managed to recover all the subkeys needed in the BC3 encryption process seconds using Matlab. This result does not imply a weakness in the BC3 encryption algorithm, but the implementation of BC3 encryption should take account of security factors so the implementation is resistant to some attacks.<p align="justify"> text
institution Institut Teknologi Bandung
building Institut Teknologi Bandung Library
continent Asia
country Indonesia
Indonesia
content_provider Institut Teknologi Bandung
collection Digital ITB
language Indonesia
description <p align="justify">BC3 is encryption algorithm developed by Indonesian researchers, and designed to deal with various analysis such as linear analysis, differential analysis, interpolation attack, etc. However, BC3 had never been tested with an implementation attack, e.g. simple power analysis (SPA), correlation power analysis (CPA) and so on. Thus, in this research the author would do hardware implementation of the BC3 algorithm in FPGA and then attack this implementation with correlation power analysis. The author used with CW1173 board to capture power consumption. The author managed to recover all the subkeys needed in the BC3 encryption process seconds using Matlab. This result does not imply a weakness in the BC3 encryption algorithm, but the implementation of BC3 encryption should take account of security factors so the implementation is resistant to some attacks.<p align="justify">
format Theses
author , Ma'muri
spellingShingle , Ma'muri
ATTACK ON HARDWARE IMPLEMENTATION OF BC3 ENCRYPTION WITH CORRELATION POWER ANALYSIS
author_facet , Ma'muri
author_sort , Ma'muri
title ATTACK ON HARDWARE IMPLEMENTATION OF BC3 ENCRYPTION WITH CORRELATION POWER ANALYSIS
title_short ATTACK ON HARDWARE IMPLEMENTATION OF BC3 ENCRYPTION WITH CORRELATION POWER ANALYSIS
title_full ATTACK ON HARDWARE IMPLEMENTATION OF BC3 ENCRYPTION WITH CORRELATION POWER ANALYSIS
title_fullStr ATTACK ON HARDWARE IMPLEMENTATION OF BC3 ENCRYPTION WITH CORRELATION POWER ANALYSIS
title_full_unstemmed ATTACK ON HARDWARE IMPLEMENTATION OF BC3 ENCRYPTION WITH CORRELATION POWER ANALYSIS
title_sort attack on hardware implementation of bc3 encryption with correlation power analysis
url https://digilib.itb.ac.id/gdl/view/28727
_version_ 1822021800713781248