File:Power_attack.png
From Wikipedia, the free encyclopedia
Size of this preview: 800 × 191 pixels. Other resolutions: 320 × 76 pixels | 1,020 × 243 pixels.
Original file (1,020 × 243 pixels, file size: 5 KB, MIME type: image/png)
This is a file from the Wikimedia Commons. Information from its description page there is shown below. Commons is a freely licensed media file repository. You can help. |
DescriptionPower attack.png |
English: Power variations, observed during work of the embedded processor, computing RSA signatures. The left (short) peak represents iteration without multiplication (key bit is cleared), and the right represents iteration with multiplication (key bit is set). The low power pause between iterations has been artificially implemented to make key decoding trivial. This would be more complex on the real world devices that, differently, try to obfuscate it. This is a trimmed version. |
Source | Own work |
Author | Audriusa. Recorded by student in ETH (Zurich) during system security laboratory work. |
Other versions | Power attack full.png - with oscilloscope frame showing settings. |
This work is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or any later version. This work is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of merchantability or fitness for a particular purpose. See version 2 and version 3 of the GNU General Public License for more details.http://www.gnu.org/licenses/gpl.htmlGPLGNU General Public Licensetruetrue |
Items portrayed in this file
depicts
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 11:39, 17 March 2010 | 1,020 × 243 (5 KB) | Audriusa | {{Information |Description={{en|1=Power variations, observed during work of the embedded processor, computing RSA signatures. The left (short) peak represents iteration with multiplication (key bit is cleared), and the right represents iteration witho |
File usage
The following pages on the English Wikipedia use this file (pages on other projects are not listed):
Global file usage
The following other wikis use this file:
- Usage on ca.wikipedia.org
- Usage on es.wikipedia.org
- Usage on fa.wikipedia.org
- Usage on fi.wikipedia.org
- Usage on ja.wikipedia.org
- Usage on ko.wikipedia.org
- Usage on lmo.wikipedia.org
- Usage on pt.wikipedia.org
- Usage on ru.wikipedia.org
- Usage on tr.wikipedia.org
- Usage on uk.wikipedia.org
- Usage on wuu.wikipedia.org
- Usage on zh.wikipedia.org
Retrieved from "https://en.wikipedia.org/wiki/File:Power_attack.png"