In cryptography, power analysis is a form of side channel attack in which the attacker studies the power consumption of a cryptographic hardware device (such as a smart card, tamper-resistant "black box", or integrated circuit). The attack can non-invasively extract cryptographic keys and other secret information from the device.
Simple power analysis (SPA) involves visually interpreting power traces, or graphs of electrical activity over time. Differential power analysis (DPA) is a more advanced form of power analysis which can allow an attacker to compute the intermediate values within cryptographic computations by statistically analyzing data collected from multiple cryptographic operations. SPA and DPA were introduced in the open cryptologic community in 1998 by Cryptography Research's Paul Kocher, Joshua Jaffe and Benjamin Jun.
Read more about Power Analysis: Simple Power Analysis, Differential Power Analysis, High-order Differential Power Analysis, Power Analysis and Algorithmic Security, Standards and Practical Security Concerns, Preventing Simple and Differential Power Analysis Attacks, Patents
Famous quotes containing the words power and/or analysis:
“I know not whether the remark is to our honour or otherwise, that lessons of wisdom have never such power over us, as when they are wrought into the heart, through the ground-work of a story which engages the passions: Is it that we are like iron, and must first be heated before we can be wrought upon?”
—Laurence Sterne (17131768)
“... the big courageous acts of life are those one never hears of and only suspects from having been through like experience. It takes real courage to do battle in the unspectacular task. We always listen for the applause of our co-workers. He is courageous who plods on, unlettered and unknown.... In the last analysis it is this courage, developing between man and his limitations, that brings success.”
—Alice Foote MacDougall (18671945)