Abstract
The basic principle is “A function is easy to evaluate but its invert is infeasible unless a secret key is known”.
It is mathematically proved that security of cryptographic does not imply its implementation security of system against Side-channel Attacks. The security of system lies in the difficulty of extracting k from P and Q. It is essential to secure the implementation of cryptosystems in embedded devices against side-channel attacks. These attacks monitor the power consumption or the Electromagnetic emanations of a device Ex smart cards or mobile devices. The attacker’s goal is to retrieve partial or full information about a long-term key that is employed in several ECSM executions.
We are implementing a secret key avoid to retrieving the valuable information by the attacker through Simple Power Analysis Attacks.
Keywords