Yusuf Kurniawan
Institut Teknologi Bandung

Published : 4 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : TELKOMNIKA (Telecommunication Computing Electronics and Control)

Power analysis attack against encryption devices: a comprehensive analysis of AES, DES, and BC3 Septafiansyah Dwi Putra; Mario Yudhiprawira; Sarwono Sutikno; Yusuf Kurniawan; Adang Suwandi Ahmad
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.9384

Abstract

Cryptography is a science of creating a secret message and it is constantly developed. The development consists of attacking and defending the cryptography itself. Power analysis is one of many Side-Channel Analysis (SCA) attack techniques. Power analysis is an attacking technique that uses the information of a cryptographic hardware’s power consumption. Power analysis is carried on by utilizing side-channel information to a vulnerability in a cryptographic algorithm. Power analysis also uses a mathematical model to recover the secret key of the cryptographic device. This research uses design research methodology as a research framework started from research clarification to descriptive study. In this research, power analysis attack is implemented to three symmetrical cryptographic algorithms: DES (Data Encryption Standard), AES (Advanced Encryption Standard), and BC3 (Block Cipher 3). The attack has successfully recovered 100% of AES secret key by using 500 traces and 75% DES secret key by using 320 traces. The research concludes that the power analysis attack using Pearson Correlation Coefficient (PCC) method produces more optimal result compared to a difference of means method.
Diversity Combining Using Maxima Ratio Combining for All Modulation Mode Yusuf Kurniawan; Andyes Fourman D.A. Sudirja
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 3: September 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i3.103

Abstract

The destruction caused by channel can be seen by the existence of Amplitude and Phase Shift. By using the 6 Ways Diversity Combining method (6 Antennas/Receivers), it is expected that the disruption caused by Amplitude and Phase Shift can be suppressed as small as possible. In addition, by using diversity combining module, we will get a large SNR output which has a value sum of SNR of each diversity path. The design of Diversity combining module begins with MATLAB functional design as a big picture of the whole system. Subsequently, it will be made the hardware based on the MATLAB functional. This architectural design that will be the cornerstone in the MATLAB bit precision manufacturing. Then MATLAB bit precision will be designed as the foundation of the VHDL design. Diversity combining the output module meets the standards specified by the DVB consortium. In the hardware (FPGA) test results of diversity combining, the maximum working frequency is 44.56 MHz which has shown that is qualified with the standard sampling clock (9.142 MHz). This design also needs 4% of total FPGA Cyclone II 484I8 combinational units which is 2499 units and it needs also 3% of total register of FPGA Cyclone II 484I8 which is 1720 register units.