2021
DOI: 10.3390/app11020839
|View full text |Cite
|
Sign up to set email alerts
|

Multibyte Electromagnetic Analysis Based on Particle Swarm Optimization Algorithm

Abstract: This paper focuses on electromagnetic information security in communication systems. Classical correlation electromagnetic analysis (CEMA) is known as a powerful way to recover the cryptographic algorithm’s key. In the classical method, only one byte of the key is used while the other bytes are considered as noise, which not only reduces the efficiency but also is a waste of information. In order to take full advantage of useful information, multiple bytes of the key are used. We transform the key into a multi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 27 publications
0
4
0
Order By: Relevance
“…The key principles of species progress in nature are mirrored by the cloud model because it possesses the characteristics of fragility, vulnerability, solidity, and change in the outflow of information. As a result, the discipline of transformational processing has also begun to focus on cloud architecture [27].…”
Section: International Journal On Recent and Innovation Trends In Com...mentioning
confidence: 99%
“…The key principles of species progress in nature are mirrored by the cloud model because it possesses the characteristics of fragility, vulnerability, solidity, and change in the outflow of information. As a result, the discipline of transformational processing has also begun to focus on cloud architecture [27].…”
Section: International Journal On Recent and Innovation Trends In Com...mentioning
confidence: 99%
“…erefore, the field of evolutionary computing has also begun to focus on cloud design [8]. Song's algorithm for high-dimensional functions and nonlinear distribution particle optimization has been proposed to overcome the poor performance of particle optimization.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The system combines an electromagnetic leakage scanning platform and analysis methods into a single system, which can carry out all steps automatically. Most of the previous publications mainly focus on the key recovery of cryptographic algorithms, including our previous works [22,23]. As far as we know, there are seldom works on the electromagnetic leakage model of cryptographic integrated circuits to reveal the relationship between the electromagnetic leakage signal and the cryptographic algorithm.…”
Section: Introductionmentioning
confidence: 99%