Jump to content

Talk:Power analysis: Difference between revisions

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
Content deleted Content added
dead link
Line 8: Line 8:


The link http://www.hackhu.com/ is not only dead but its archive ghost points to something totally different (details about a lawsuit against the cryptanalysts, something like a rubber-hose protection layer for weak encryption). Please fix. Thanks. [[Special:Contributions/45.61.4.155|45.61.4.155]] ([[User talk:45.61.4.155|talk]]) 18:17, 8 November 2016 (UTC)
The link http://www.hackhu.com/ is not only dead but its archive ghost points to something totally different (details about a lawsuit against the cryptanalysts, something like a rubber-hose protection layer for weak encryption). Please fix. Thanks. [[Special:Contributions/45.61.4.155|45.61.4.155]] ([[User talk:45.61.4.155|talk]]) 18:17, 8 November 2016 (UTC)

== General Audience Clarification - Practical Details ==

Based on my understanding of this technique, its the type of attack that either requires direct, physical, access to a device/system during the analysis or at some point before it begins. '''Basically: you need to be able to sit there with a motherboard on a table, with oscilloscope probes attached to traces on a circuit board.''' Even if there are applications of this type of technique that do not require that type of physical access, if the details of the technique require that the analysis is passive (and therefore do not use/piggyback off the device/system's own communication within a network or to the internet). This article should include at least a SENTENCE of general audience clarification.[[Special:Contributions/50.150.93.206|50.150.93.206]] ([[User talk:50.150.93.206|talk]]) 21:38, 9 February 2017 (UTC)

Revision as of 21:38, 9 February 2017

WikiProject iconCryptography: Computer science Unassessed
WikiProject iconThis article is within the scope of WikiProject Cryptography, a collaborative effort to improve the coverage of Cryptography on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
???This article has not yet received a rating on Wikipedia's content assessment scale.
???This article has not yet received a rating on the importance scale.
Taskforce icon
This article is supported by WikiProject Computer science.

Preventing simple and differential power analysis attacks

Why wouldn't it be simpler to have some sort of battery or capacitor inside the device, such that the the battery has a constant draw from the external power source and the CPU can have a variable draw on the battery? Shades97 (talk) 22:58, 10 May 2012 (UTC)[reply]


The link http://www.hackhu.com/ is not only dead but its archive ghost points to something totally different (details about a lawsuit against the cryptanalysts, something like a rubber-hose protection layer for weak encryption). Please fix. Thanks. 45.61.4.155 (talk) 18:17, 8 November 2016 (UTC)[reply]

General Audience Clarification - Practical Details

Based on my understanding of this technique, its the type of attack that either requires direct, physical, access to a device/system during the analysis or at some point before it begins. Basically: you need to be able to sit there with a motherboard on a table, with oscilloscope probes attached to traces on a circuit board. Even if there are applications of this type of technique that do not require that type of physical access, if the details of the technique require that the analysis is passive (and therefore do not use/piggyback off the device/system's own communication within a network or to the internet). This article should include at least a SENTENCE of general audience clarification.50.150.93.206 (talk) 21:38, 9 February 2017 (UTC)[reply]