Analysis of the Relationship between Hamming Distance and the Electromagnetic Information Leakage

Electromagnetic information leak as a potential data security risk is more and more serious. Discussing the relationship between compromising emanations and Hamming distance is directed to preventing or reducing the electromagnetic information leakage. The paper presents the model of electromagnetic...

Full description

Saved in:
Bibliographic Details
Main Authors: Jiemin, Zhang (Author), Jinming, Liu (Author), Haimeng, Sun (Author), Jian, Mao (Author)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2014-01-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02294 am a22003013u 4500
001 ijeecs3002_1011
042 |a dc 
100 1 0 |a Jiemin, Zhang  |e author 
100 1 0 |e contributor 
700 1 0 |a Jinming, Liu  |e author 
700 1 0 |a Haimeng, Sun  |e author 
700 1 0 |a Jian, Mao  |e author 
245 0 0 |a Analysis of the Relationship between Hamming Distance and the Electromagnetic Information Leakage 
260 |b Institute of Advanced Engineering and Science,   |c 2014-01-01. 
520 |a Electromagnetic information leak as a potential data security risk is more and more serious. Discussing the relationship between compromising emanations and Hamming distance is directed to preventing or reducing the electromagnetic information leakage. The paper presents the model of electromagnetic information leak, then the hierarchical protection strategy based on the model is proposed, that is anti-radiation, anti-intercept and anti-reconstruction. Analyzing the causes of electromagnetic information leak through the touch screen case, the paper describes the electromagnetic radiation intensity is correlated to the transition's Hamming distance. The paper presents the anti-intercept method, which is reducing the Hamming distance of the sensitive data or keep Hamming distance constant in order to reducing or preventing the electromagnetic information leakage. The anti-intercept method is available showed as the touch screen case. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3966    
540 |a Copyright (c) 2013 Institute of Advanced Engineering and Science 
540 |a http://creativecommons.org/licenses/by-nc-nd/4.0 
546 |a eng 
690 |a Electromagnetic information leakage; hierarchical protection strategy; Hamming distance; data security; anti-intercept 
655 7 |a info:eu-repo/semantics/article  |2 local 
655 7 |a info:eu-repo/semantics/publishedVersion  |2 local 
655 7 |2 local 
786 0 |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 12, No 1: January 2014; 269-274 
786 0 |n 2502-4760 
786 0 |n 2502-4752 
786 0 |n 10.11591/ijeecs.v12.i1 
787 0 |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3002/1011 
856 4 1 |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3002/1011  |z Get fulltext