dc.contributor.author |
Hettiarachchi, MJ |
|
dc.contributor.author |
Sandanuwan, HHGD |
|
dc.contributor.author |
Balasooriya, RW |
|
dc.contributor.author |
Hettiarachchi, R |
|
dc.contributor.author |
Abeywardena, KY |
|
dc.contributor.author |
Yapa, K |
|
dc.contributor.editor |
Piyatilake, ITS |
|
dc.contributor.editor |
Thalagala, PD |
|
dc.contributor.editor |
Ganegoda, GU |
|
dc.contributor.editor |
Thanuja, ALARR |
|
dc.contributor.editor |
Dharmarathna, P |
|
dc.date.accessioned |
2024-02-05T12:41:01Z |
|
dc.date.available |
2024-02-05T12:41:01Z |
|
dc.date.issued |
2023-12-07 |
|
dc.identifier.uri |
http://dl.lib.uom.lk/handle/123/22162 |
|
dc.description.abstract |
Protecting sensitive data in the field of symmetric
key cryptography requires strong security against side-channel
attacks. The confidentiality and integrity of cryptographic
systems are seriously threatened by side-channel attacks, which
take advantage of accidental information loss through a variety
of physical channels. This research provides a comprehensive
analysis of side-channel attacks and suggests an analysis method
to highlight the vulnerability of a given symmetric algorithm.
The relevance of side-channel attacks and their impact on
cryptographic solutions are first discussed in the study.
Following that, it concentrates on a well-known side-channel
attack category which is Time Analysis attack. The simulation
of this attack will be primarily tested on DES (Data Encryption
Standard) algorithm. This research contributes to the present
day attempts to strengthen the security of symmetric key
cryptography by providing a thorough analysis of side-channel
attacks. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Information Technology Research Unit, Faculty of Information Technology, University of Moratuwa. |
en_US |
dc.subject |
Attacks |
en_US |
dc.subject |
Cipher text (ct) |
en_US |
dc.subject |
Cryptography |
en_US |
dc.subject |
DES |
en_US |
dc.subject |
Encryption |
en_US |
dc.subject |
K (Key) |
en_US |
dc.subject |
LAN (Local Area Networks) |
en_US |
dc.subject |
Masking |
en_US |
dc.subject |
NPt (New Plain text) |
en_US |
dc.subject |
NK (New Key) |
en_US |
dc.subject |
Plain text (pt) |
en_US |
dc.subject |
Side-channel |
en_US |
dc.subject |
T (Time) |
en_US |
dc.title |
Time analysis side channeling attack in symmetric key cryptography |
en_US |
dc.type |
Conference-Full-text |
en_US |
dc.identifier.faculty |
IT |
en_US |
dc.identifier.department |
Information Technology Research Unit, Faculty of Information Technology, University of Moratuwa. |
en_US |
dc.identifier.year |
2023 |
en_US |
dc.identifier.conference |
8th International Conference in Information Technology Research 2023 |
en_US |
dc.identifier.place |
Moratuwa, Sri Lanka |
en_US |
dc.identifier.pgnos |
pp. 1-5 |
en_US |
dc.identifier.proceeding |
Proceedings of the 8th International Conference in Information Technology Research 2023 |
en_US |
dc.identifier.email |
it20189808@my.sliit.lk |
en_US |
dc.identifier.email |
it20141424@my.sliit.lk |
en_US |
dc.identifier.email |
it20134594@my.sliit.lk |
en_US |
dc.identifier.email |
it20190934@my.sliit.lk |
en_US |
dc.identifier.email |
kavinga.y@sliit.lk |
en_US |
dc.identifier.email |
kanishka.y@sliit.lk |
en_US |