Match!
Yasin Fitri Alias
Universiti Teknologi MARA
Timing attackComputer sciencePiAttack modelKey exchange
5Publications
1H-index
3Citations
What is this?
Publications 5
Newest
#1Mohd Anuar Mat Isa (UiTM: Universiti Teknologi MARA)H-Index: 6
#2Habibah Hashim (UiTM: Universiti Teknologi MARA)H-Index: 11
Last. Yasin Fitri Alias (UiTM: Universiti Teknologi MARA)H-Index: 1
view all 5 authors...
The advancing of Key Exchange Protocol (KEP) is compulsory to secure the connected world via Internet of Thing (IoT), cryptocurrency and blockchain, virtual intelligent, smart computing etc. To address the security issues in the Internet based computing systems, this paper explores the side-channel security for KEP, namely timing and relay attacks. Nowadays, various KEP variances are used by internet protocol such as IKEv2/3. The purpose of KEP is to enable a secret key(s) sharing between two or...
Source
#1Yasin Fitri AliasH-Index: 1
#2Habibah HashimH-Index: 11
In Diffie-Hellman Key Exchange (DHKE), two parties need to communicate to each other by sharing their secret key (cipher text) over an unsecure communication channel. An adversary or cryptanalyst can easily get their secret keys but cannot get the information (plaintext). Brute force is one the common tools used to obtain the secret key, but when the key is too large (etc. 1024 bits and 2048 bits) this tool is no longer suitable. Thus timing attacks have become more attractive in the new cryptog...
Source
#1Yasin Fitri Alias (UiTM: Universiti Teknologi MARA)H-Index: 1
#2Mohd Anuar Mat Isa (UiTM: Universiti Teknologi MARA)H-Index: 6
Last. Habibah Hashim (UiTM: Universiti Teknologi MARA)H-Index: 11
view all 3 authors...
Timing attacks have caused an unprecedented evolution in the present cryptographic era where more and more cryptographic applications are running on embedded systems in a wireless environment. Paul Kocher, a well-known cryptanalyst was the first to successfully implement a timing attack on a cryptosystem. Subsequently many other timing attacks have been recorded while cryptographers tirelessly work on making the schemes more resistant to these and other side channel attacks. In this work, we exa...
1 Citations
#1M. Amir Hamzah M. Isa (UiTM: Universiti Teknologi MARA)H-Index: 1
#2Mohd Fuad Abdul Latip (UiTM: Universiti Teknologi MARA)H-Index: 3
Last. Yasin Fitri Alias (UiTM: Universiti Teknologi MARA)H-Index: 1
view all 4 authors...
The electricity demand keeps on increasing year by year. In Malaysia, energy consumption has increased rapidly from an average of 5% in 1980s and 12% in 2009. Due to this increasing trend, government has encouraged users to reduce their electricity consumption. One of the way is by introducing the smart meter as a solution, where the smart meter device is used to display the total of energy consumption by users. In this context, we have developed an online-based energy smart monitoring system fo...
1 CitationsSource
#1Yasin Fitri Alias (UiTM: Universiti Teknologi MARA)H-Index: 1
#2Mohd Anuar Mat Isa (UiTM: Universiti Teknologi MARA)H-Index: 6
Last. Habibah Hashim (UiTM: Universiti Teknologi MARA)H-Index: 11
view all 3 authors...
Timing attack is a type of side-channel attack directed at weakly secured computing devices and aims at extracting private keys from cryptosystems. The incidence of timing attacks is expected to rise in the age of Internet of Things (IoT) where devices are mostly power-constrained and cryptographic implementations are minimal. These types of attacks rely on precise timings obtained from cryptographic operations and reconstructing the cryptographic key from such information. This paper presents a...
1 CitationsSource
1