File:Power attack.png

File on OODA WIKI

Original file(1,020 × 243 pixels, file size: 5 KB, MIME type: image/png)

Summary

File information
Description

English: Power variations, observed during work of the embedded processor, computing RSA signatures. The left (short) peak represents iteration without multiplication (key bit is cleared), and the right represents iteration with multiplication (key bit is set). The low power pause between iterations has been artificially implemented to make key decoding trivial. This would be more complex on the real world devices that, differently, try to obfuscate it. This is a trimmed version.

Source

Own work

Date
Author

Audriusa. Recorded by student in ETH (Zurich) during system security laboratory work.

Permission
(Reusing this file)

See below.

Other versions Power attack full.png - with oscilloscope frame showing settings.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current21:21, 5 February 2024Thumbnail for version as of 21:21, 5 February 20241,020 × 243 (5 KB)Isidore (talk | contribs){{Information |Description={{en|1=Power variations, observed during work of the embedded processor, computing RSA signatures. The left (short) peak represents iteration without multiplication (key bit is cleared), and the right represents iteration with multiplication (key bit is set). The low power pause between iterations has been artificially implemented to make key decoding trivial. This would be more complex on the real world devices that, differently, try to obfuscate it. This is a...

The following page uses this file:

Metadata