Description Usage Arguments Details Value Author(s) References Examples
The dpa1
function applies a Differential Power Analysis (DPA) to a set of traces in order to find the key used by the cryptographic device.
1 |
x |
A matrix where each row is a trace. |
y |
A vector where the i_th element of the vector y is the key for the i_th trace in the matrix x. |
... |
Currently ignored. |
The dpa1
function is an example of DPA. It calculates the average X_i of traces for each key Y_i.
Then, to estimate the key from a trace T, it returns the key Y_i which maximizes the equation argmax{Y_i}(cor(T,X_i))
The dpa1
function returns an object which knowing a trace can be used with the predict
function that estimates the value of the key.
The value of this function is an object of class dpa1
, which is a list with the following components:
mean |
a list of arithmetics means, one for each possible key |
Liran Lerman llerman@ulb.ac.be & Gianluca Bontempi gbonte@ulb.ac.be@ulb.ac.be & Olivier Markowitch olivier.markowitch@ulb.ac.be
P. C. Kocher & J. Jaffe & B. Jun, (1999), "Differential Power Analysis: Leaking Secrets", In Proc. Crypto '99, Springer-Verlag, LNCS 1666, pages 388-397.
1 2 3 4 5 6 7 8 9 10 |
Add the following code to your website.
For more information on customizing the embed code, read Embedding Snippets.