Power Analysis and Algorithmic Security
Power analysis provides a way to "see inside" otherwise 'tamperproof' hardware. For example, DES's key schedule involves rotating 28-bit key registers. Many implementations check the least significant bit to see if it is a 1. If so, the device shifts the register right and prepends the 1 at the left end. If the bit is a zero, the register is shifted right without prepending a 1. Power analysis can distinguish between these processes, enabling an adversary to determine the bits of the secret key.
Implementations of algorithms such as AES and triple DES that are believed to be mathematically strong may be trivially breakable using power analysis attacks. As a result, power analysis attacks combine elements of algorithmic cryptanalysis and implementation security.
Read more about this topic: Power Analysis
Famous quotes containing the words power, analysis and/or security:
“The delicious faces of children, the beauty of school-girls, the sweet seriousness of sixteen, the lofty air of well-born, well-bred boys, the passionate histories in the looks and manners of youth and early manhood, and the varied power in all that well-known company that escort us through life,we know how these forms thrill, paralyze, provoke, inspire, and enlarge us.”
—Ralph Waldo Emerson (18031882)
“A commodity appears at first sight an extremely obvious, trivial thing. But its analysis brings out that it is a very strange thing, abounding in metaphysical subtleties and theological niceties.”
—Karl Marx (18181883)
“Modern children were considerably less innocent than parents and the larger society supposed, and postmodern children are less competent than their parents and the society as a whole would like to believe. . . . The perception of childhood competence has shifted much of the responsibility for child protection and security from parents and society to children themselves.”
—David Elkind (20th century)