post_parent): $temp_content = $post->post_content; $temp_content = explode("

",$temp_content); $temp_content = $temp_content[1]; $temp_content = explode("

",$temp_content); $temp_content = $temp_content[0]; $temp_content = strip_tags($temp_content); $temp_content = trim($temp_content); $authors = explode(",",$temp_content); ?> post_title));?>"> $value): ?> "> "> "> post_content); while ($parser->parse()) { if (($parser->iNodeName=="a")&&(substr_count($parser->iNodeAttributes['href'],".pdf")>0)): ?>

Way to counter the reconstruction of key block algorithms of information security analysis based on the dynamics of power consumption

Zyuzya A.A.

The article studies power analysis key reconstruction methods for cryptographic algorithms. The analysis of existing software countermeasures for such types of attacks was done. A new power analysis obstruction method was proposed. It is based on pseudo parallel data processing in time sharing mode. The method is characterized by a stochastic switching between proceeding blocks of data for random time location of block processing stages. It significantly reduces effectiveness of the power analysis key reconstruction methods. Proposed method was implemented in software implementation of GOST 28.147-89 cryptographic algorithm. Decrease in performance of such modified implementation is less then via using other power analysis obstruction methods.


Full text (pdf)