ResearchSpace

An investigation into the signals leakage from a smartcard based on different runtime code

Show simple item record

dc.contributor.author Frieslaar, I
dc.contributor.author Irwin, B
dc.date.accessioned 2016-07-20T10:54:19Z
dc.date.available 2016-07-20T10:54:19Z
dc.date.issued 2015-09
dc.identifier.citation Frieslaar, I. and Irwin, B. 2015. An investigation into the signals leakage from a smartcard based on different runtime code. In: The annual Southern Africa Telecommunication Networks and Applications Conference (SATNAC), Kogelberg Biosphere Reserve, Hermanus, Western Cape, South Africa, 6-9 September 2015 en_US
dc.identifier.uri http://hdl.handle.net/10204/8641
dc.description The annual Southern Africa Telecommunication Networks and Applications Conference (SATNAC), Kogelberg Biosphere Reserve, Hermanus, Western Cape, South Africa, 6-9 September 2015. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website. en_US
dc.description.abstract This paper investigates the power leakage of a smartcard. It is intended to answer two vital questions: what information is leaked out when different characters are used as output; and does the length of the output affect the amount of the information leaked. The investigation determines that as the length of the output is increased more bus lines are switched from a precharge state to a high state. This is related to the output array in the code increasing its length. Furthermore, this work shows that the output for different characters generates a different pattern. This is due to the fact that various characters needs different amount of bytes to be executed since they have different binary value. Additionally, the information leaked out can be directly linked to the smartcard’s interpreter. en_US
dc.language.iso en en_US
dc.relation.ispartofseries Workflow;15774
dc.subject Smartcard en_US
dc.subject Power leakage en_US
dc.subject Smartcard’s interpreter en_US
dc.subject Data Encryption Standard en_US
dc.subject DES en_US
dc.subject Electromagnetic emanation en_US
dc.title An investigation into the signals leakage from a smartcard based on different runtime code en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Frieslaar, I., & Irwin, B. (2015). An investigation into the signals leakage from a smartcard based on different runtime code. http://hdl.handle.net/10204/8641 en_ZA
dc.identifier.chicagocitation Frieslaar, I, and B Irwin. "An investigation into the signals leakage from a smartcard based on different runtime code." (2015): http://hdl.handle.net/10204/8641 en_ZA
dc.identifier.vancouvercitation Frieslaar I, Irwin B, An investigation into the signals leakage from a smartcard based on different runtime code; 2015. http://hdl.handle.net/10204/8641 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Frieslaar, I AU - Irwin, B AB - This paper investigates the power leakage of a smartcard. It is intended to answer two vital questions: what information is leaked out when different characters are used as output; and does the length of the output affect the amount of the information leaked. The investigation determines that as the length of the output is increased more bus lines are switched from a precharge state to a high state. This is related to the output array in the code increasing its length. Furthermore, this work shows that the output for different characters generates a different pattern. This is due to the fact that various characters needs different amount of bytes to be executed since they have different binary value. Additionally, the information leaked out can be directly linked to the smartcard’s interpreter. DA - 2015-09 DB - ResearchSpace DP - CSIR KW - Smartcard KW - Power leakage KW - Smartcard’s interpreter KW - Data Encryption Standard KW - DES KW - Electromagnetic emanation LK - https://researchspace.csir.co.za PY - 2015 T1 - An investigation into the signals leakage from a smartcard based on different runtime code TI - An investigation into the signals leakage from a smartcard based on different runtime code UR - http://hdl.handle.net/10204/8641 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record