SCA berkaitan erat dengan keberadaan fenomena yang dapat diobservasi secara fisik, yang disebabkan oleh proses pada perangkat mikroelektronika. Misalnya, mikroprosesor yang mengkonsumsi waktu dan daya untuk melakukan proses. Mikroprosesor juga memancarkan medan elektromagnetik, menghamburkan panas, dan bahkan membuat beberapa noise. [2] Ada banyak sumber informasi yang bocor dari komputer yang kemudian dapat dimanfaatkan oleh lawan. [2]
Referensi #
- T. S. Messerges, E. A. Dabbish, and R. H. Sloan, “Examining Smart-Card Security Under The Threat of Power Analysis Attacks,” Computers, IEEE Transactions on, vol. 51, no. 5, pp. 541–552, 2002.
- F.-X. Standaert, “Introduction to Side-Channel Attacks,” pp. 27–42, 2010.
- S. Mangard, E. Oswald, and T. Popp, Power Analysis Attack: Revealing the Secrets of Smart Cards. 2007.
- S. Sun, Z. Yan, and J. Zambreno, “Experiments in attacking FPGA-based embedded systems using differential power analysis,” 2008 IEEE International Conference on Electro/Information Technology, pp. 7–12, 2008.
- R. Velegalati and P. S. V. V. K. Yalla, “Differential Power Analysis Attack on FPGA Implementation of AES,” pp. 1–5, 2008.
- H. Li, K. Wu, B. Peng, Y. Zhang, X. Zheng, and F. Yu, “Enhanced correlation power analysis attack on smart card,” Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, pp. 2143–2148, 2008.
- H. Bar-El, “Introduction to Side Channel Attacks,” Secure Integrated Circuits and Systems, 2010.
- Messerges and T. S., “Power analysis attacks and countermeasures for cryptographic algorithms,” 2000.
Since you've made it this far, sharing this article on your favorite social media network would be highly appreciated 💖! For feedback, please ping me on Twitter.
Published