Time analysis side channeling attack in symmetric key cryptography

dc.contributor.authorHettiarachchi, MJ
dc.contributor.authorSandanuwan, HHGD
dc.contributor.authorBalasooriya, RW
dc.contributor.authorHettiarachchi, R
dc.contributor.authorAbeywardena, KY
dc.contributor.authorYapa, K
dc.contributor.editorPiyatilake, ITS
dc.contributor.editorThalagala, PD
dc.contributor.editorGanegoda, GU
dc.contributor.editorThanuja, ALARR
dc.contributor.editorDharmarathna, P
dc.date.accessioned2024-02-05T12:41:01Z
dc.date.available2024-02-05T12:41:01Z
dc.date.issued2023-12-07
dc.description.abstractProtecting sensitive data in the field of symmetric key cryptography requires strong security against side-channel attacks. The confidentiality and integrity of cryptographic systems are seriously threatened by side-channel attacks, which take advantage of accidental information loss through a variety of physical channels. This research provides a comprehensive analysis of side-channel attacks and suggests an analysis method to highlight the vulnerability of a given symmetric algorithm. The relevance of side-channel attacks and their impact on cryptographic solutions are first discussed in the study. Following that, it concentrates on a well-known side-channel attack category which is Time Analysis attack. The simulation of this attack will be primarily tested on DES (Data Encryption Standard) algorithm. This research contributes to the present day attempts to strengthen the security of symmetric key cryptography by providing a thorough analysis of side-channel attacks.en_US
dc.identifier.conference8th International Conference in Information Technology Research 2023en_US
dc.identifier.departmentInformation Technology Research Unit, Faculty of Information Technology, University of Moratuwa.en_US
dc.identifier.emailit20189808@my.sliit.lken_US
dc.identifier.emailit20141424@my.sliit.lken_US
dc.identifier.emailit20134594@my.sliit.lken_US
dc.identifier.emailit20190934@my.sliit.lken_US
dc.identifier.emailkavinga.y@sliit.lken_US
dc.identifier.emailkanishka.y@sliit.lken_US
dc.identifier.facultyITen_US
dc.identifier.pgnospp. 1-5en_US
dc.identifier.placeMoratuwa, Sri Lankaen_US
dc.identifier.proceedingProceedings of the 8th International Conference in Information Technology Research 2023en_US
dc.identifier.urihttp://dl.lib.uom.lk/handle/123/22162
dc.identifier.year2023en_US
dc.language.isoenen_US
dc.publisherInformation Technology Research Unit, Faculty of Information Technology, University of Moratuwa.en_US
dc.subjectAttacksen_US
dc.subjectCipher text (ct)en_US
dc.subjectCryptographyen_US
dc.subjectDESen_US
dc.subjectEncryptionen_US
dc.subjectK (Key)en_US
dc.subjectLAN (Local Area Networks)en_US
dc.subjectMaskingen_US
dc.subjectNPt (New Plain text)en_US
dc.subjectNK (New Key)en_US
dc.subjectPlain text (pt)en_US
dc.subjectSide-channelen_US
dc.subjectT (Time)en_US
dc.titleTime analysis side channeling attack in symmetric key cryptographyen_US
dc.typeConference-Full-texten_US

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Time Analysis Side Channeling Attack.pdf
Size:
417.43 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description:

Collections