Frieslaar, IIrwin, B2016-07-202016-07-202015-09Frieslaar, I. and Irwin, B. 2015. An investigation into the signals leakage from a smartcard based on different runtime code. In: The annual Southern Africa Telecommunication Networks and Applications Conference (SATNAC), Kogelberg Biosphere Reserve, Hermanus, Western Cape, South Africa, 6-9 September 2015http://hdl.handle.net/10204/8641The annual Southern Africa Telecommunication Networks and Applications Conference (SATNAC), Kogelberg Biosphere Reserve, Hermanus, Western Cape, South Africa, 6-9 September 2015. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website.This paper investigates the power leakage of a smartcard. It is intended to answer two vital questions: what information is leaked out when different characters are used as output; and does the length of the output affect the amount of the information leaked. The investigation determines that as the length of the output is increased more bus lines are switched from a precharge state to a high state. This is related to the output array in the code increasing its length. Furthermore, this work shows that the output for different characters generates a different pattern. This is due to the fact that various characters needs different amount of bytes to be executed since they have different binary value. Additionally, the information leaked out can be directly linked to the smartcard’s interpreter.enSmartcardPower leakageSmartcard’s interpreterData Encryption StandardDESElectromagnetic emanationAn investigation into the signals leakage from a smartcard based on different runtime codeConference PresentationFrieslaar, I., & Irwin, B. (2015). An investigation into the signals leakage from a smartcard based on different runtime code. http://hdl.handle.net/10204/8641Frieslaar, I, and B Irwin. "An investigation into the signals leakage from a smartcard based on different runtime code." (2015): http://hdl.handle.net/10204/8641Frieslaar I, Irwin B, An investigation into the signals leakage from a smartcard based on different runtime code; 2015. http://hdl.handle.net/10204/8641 .TY - Conference Presentation AU - Frieslaar, I AU - Irwin, B AB - This paper investigates the power leakage of a smartcard. It is intended to answer two vital questions: what information is leaked out when different characters are used as output; and does the length of the output affect the amount of the information leaked. The investigation determines that as the length of the output is increased more bus lines are switched from a precharge state to a high state. This is related to the output array in the code increasing its length. Furthermore, this work shows that the output for different characters generates a different pattern. This is due to the fact that various characters needs different amount of bytes to be executed since they have different binary value. Additionally, the information leaked out can be directly linked to the smartcard’s interpreter. DA - 2015-09 DB - ResearchSpace DP - CSIR KW - Smartcard KW - Power leakage KW - Smartcard’s interpreter KW - Data Encryption Standard KW - DES KW - Electromagnetic emanation LK - https://researchspace.csir.co.za PY - 2015 T1 - An investigation into the signals leakage from a smartcard based on different runtime code TI - An investigation into the signals leakage from a smartcard based on different runtime code UR - http://hdl.handle.net/10204/8641 ER -