Analysis of the Relationship between Hamming Distance and the Electromagnetic Information Leakage
Electromagnetic information leak as a potential data security risk is more and more serious. Discussing the relationship between compromising emanations and Hamming distance is directed to preventing or reducing the electromagnetic information leakage. The paper presents the model of electromagnetic...
Saved in:
Main Authors: | , , , |
---|---|
Format: | EJournal Article |
Published: |
Institute of Advanced Engineering and Science,
2014-01-01.
|
Subjects: | |
Online Access: | Get fulltext |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 02294 am a22003013u 4500 | ||
---|---|---|---|
001 | ijeecs3002_1011 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Jiemin, Zhang |e author |
100 | 1 | 0 | |e contributor |
700 | 1 | 0 | |a Jinming, Liu |e author |
700 | 1 | 0 | |a Haimeng, Sun |e author |
700 | 1 | 0 | |a Jian, Mao |e author |
245 | 0 | 0 | |a Analysis of the Relationship between Hamming Distance and the Electromagnetic Information Leakage |
260 | |b Institute of Advanced Engineering and Science, |c 2014-01-01. | ||
520 | |a Electromagnetic information leak as a potential data security risk is more and more serious. Discussing the relationship between compromising emanations and Hamming distance is directed to preventing or reducing the electromagnetic information leakage. The paper presents the model of electromagnetic information leak, then the hierarchical protection strategy based on the model is proposed, that is anti-radiation, anti-intercept and anti-reconstruction. Analyzing the causes of electromagnetic information leak through the touch screen case, the paper describes the electromagnetic radiation intensity is correlated to the transition's Hamming distance. The paper presents the anti-intercept method, which is reducing the Hamming distance of the sensitive data or keep Hamming distance constant in order to reducing or preventing the electromagnetic information leakage. The anti-intercept method is available showed as the touch screen case. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3966 | ||
540 | |a Copyright (c) 2013 Institute of Advanced Engineering and Science | ||
540 | |a http://creativecommons.org/licenses/by-nc-nd/4.0 | ||
546 | |a eng | ||
690 | |a Electromagnetic information leakage; hierarchical protection strategy; Hamming distance; data security; anti-intercept | ||
655 | 7 | |a info:eu-repo/semantics/article |2 local | |
655 | 7 | |a info:eu-repo/semantics/publishedVersion |2 local | |
655 | 7 | |2 local | |
786 | 0 | |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 12, No 1: January 2014; 269-274 | |
786 | 0 | |n 2502-4760 | |
786 | 0 | |n 2502-4752 | |
786 | 0 | |n 10.11591/ijeecs.v12.i1 | |
787 | 0 | |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3002/1011 | |
856 | 4 | 1 | |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3002/1011 |z Get fulltext |