THE CPA QUALIFICATION METHOD BASED ON THE GAUSSIAN CURVE FITTING
Abstract: The Correlation
Power Analysis (CPA) attack is an attack on cryptographic devices, especially smart
cards. The results of the attack are correlation traces. Based on the
correlation traces, an evaluation is done to observe whether significant peaks
appear in the traces or not. The evaluation is done manually, by experts. If
significant peaks appear then the smart card is not considered secure since it
is assumed that the secret key is
revealed. We develop
a method that
objectively detects peaks
and decides which
peak is significant. We
conclude that using
the Gaussian curve
fitting method, the subjective
qualification of the
peak significance can be objectified. Thus, better decisions can be
taken by security experts. We also conclude that the Gaussian curve fitting
method is able to show the influence of peak sizes, especially the width and
height, to a significance of a particular peak.
Keywords: Cryptography, side
channel attack, correlation
power analysis, smart
cards, significant peak detection, Gaussian curve fitting
Author: M.T. Adithia
Journal Code: jptinformatikagg150006

Artikel Terkait :
Jp Teknik Informatika gg 2015
- Does Internet Censorship Reduce Crime Rate?
- Geometric Model for Human Body Orientation Classification
- Information Technology Service Management with Cloud Computing Approach to Improve Administration System and Online Learning Performance
- Digital Technology: the Effect of Connected World to Computer Ethic and Family
- Learning Management System Development with Application of Asynchronous Learning Method in STMIK IBBI Medan
- A Study of Customer Satisfaction on Online Trading System Application of Securities Company in Indonesia Using Servqual
- Web-Based Implementation of E-Marketing to Support Product Marketing of Chemical Manufacturing Company
- Analysis of Relationship between Three Dimensions of Quality, User Satisfaction, and E-Learning Usage of Binus Online Learning
- A Study on Bipedal and Mobile Robot Behavior Through Modeling and Simulation
- Implementation and Reconfiguration of Robot Operating System on Human Follower Transporter Robot
- The Influence of Customers Communication Behaviour in the Implementation of 21cineplex Viral Marketing Using the Social Networking Site Facebook
- Extended Vector Space Model with Semantic Relatedness on Java Archive Search Engine
- Analysis of MapReduce Model on Big Data Processing within Cloud Computing
- IOS APPLICATION FOR FINDING HALAL FOOD, MOSQUE, QIBLA DIRECTION AND PRAYER TIME
- DESIGNING ESP MATERIALS FOR TOURISM STUDENTS OF AKADEMI PARIWISATA MEDAN
- THE MASTERY OF ADJECTIVE CLAUSES BY THE SECOND YEAR SENIOR HIGH SCHOOL STUDENTS (Case Study: SMA Alwashliyah Medan)