Original file (1,020 × 243 pixels, file size: 5 KB, MIME type: image/png)
Summary
Description |
English: Power variations, observed during work of the embedded processor, computing RSA signatures. The left (short) peak represents iteration without multiplication (key bit is cleared), and the right represents iteration with multiplication (key bit is set). The low power pause between iterations has been artificially implemented to make key decoding trivial. This would be more complex on the real world devices that, differently, try to obfuscate it. This is a trimmed version. |
---|---|
Source |
Own work |
Date | |
Author |
Audriusa. Recorded by student in ETH (Zurich) during system security laboratory work. |
Permission (Reusing this file) |
See below. |
Other versions | Power attack full.png - with oscilloscope frame showing settings. |
This work is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or any later version. This work is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of merchantability or fitness for a particular purpose. See version 2 and version 3 of the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA |
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 21:21, 5 February 2024 | 1,020 × 243 (5 KB) | Isidore (talk | contribs) | {{Information |Description={{en|1=Power variations, observed during work of the embedded processor, computing RSA signatures. The left (short) peak represents iteration without multiplication (key bit is cleared), and the right represents iteration with multiplication (key bit is set). The low power pause between iterations has been artificially implemented to make key decoding trivial. This would be more complex on the real world devices that, differently, try to obfuscate it. This is a... |
You cannot overwrite this file.
File usage
The following page uses this file: