Changes

Correlation Power Analysis

21 bytes added, 20:41, 25 March 2017
no edit summary
Then, we can proceed with the attack as described above. Since we are attacking one byte of the key at a time, we will have to try <math>I = 2^8</math> values for each subkey. Then, there are 16 bytes in the key, so our attack will take <math>16 \times 2^8 = 2^{12}</math> time. This is an enormous improvement over trying every possible key, which would take <math>2^{128}</math> time.
 
[[Category:Theory]]
Approved_users, bureaucrat, administrator
1,956
edits