Evaluation:
Published: 08.05.2004.
Language: English
Level: Secondary school
Literature: n/a
References: Not used
  • Essays 'Explain the Main Developments in E-Commerce Security', 1.
  • Essays 'Explain the Main Developments in E-Commerce Security', 2.
  • Essays 'Explain the Main Developments in E-Commerce Security', 3.
Extract

For this scenario, timing attacks could also be used by Eve on the AES encryption, along with Power Analysis. Power Analysis involves observing the power consumption of the device at any point during the cryptographic process as power consumption can be seen to be related to the instruction being executed and data being process (e.g. multiplication uses more power than addition, etc). Timing analysis is also relevant for symmetric ciphers as well as public key algorithms. In this case, information about the key or plaintext could be obtained by observing how long it takes the given implantation to perform decryptions on various cipher texts. This exploits
There is also a weakness in using the Electronic Code Book mode of operation. Electronic Code Book is a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding cipher text value and vice versa. The same plaintext value will always result in the same cipher text value. …

Send to email

Your name:

Enter an email address where the link will be sent:

Hi!
{Your name} suggests you to check out this eKönyvtár paper on „Explain the Main Developments in E-Commerce Security”.

Link to paper:
https://eng.ekonyvtar.eu/w/874659

Send

Email has been sent