IntelliPaper
Abstract
The basic principle is “A function is easy to evaluate but its invert is infeasible unless a secret key is known”.
It is mathematically proved that security of cryptographic does not imply its implementation security of system against Side-channel Attacks. The security of system lies in the difficulty of extracting k from P and Q. It is essential to secure the implementation of cryptosystems in embedded devices against side-channel attacks. These attacks monitor the power consumption or the Electromagnetic emanations of a device Ex smart cards or mobile devices. The attacker’s goal is to retrieve partial or full information about a long-term key that is employed in several ECSM executions.
We are implementing a secret key avoid to retrieving the valuable information by the attacker through Simple Power Analysis Attacks.
Conflict of Interest
The authors declare no conflict of interest.
Ethical Approval
Not applicable
Data Availability
The datasets used in this study are openly available at [repository link] and the source code is available on GitHub at [GitHub link].
Funding
This work did not receive any external funding.