ISSN (online) : 2395 - 7549

Aim and Scope
Call for Paper
Join As Reviewer
Check Status
Submit Payment
Author Guideline
Paper Format
Publication Fee



Analysis of Side Channel Attacks on Various Cryptographic Algorithms


Prof. Samir Kumar Bandyopadhyay , Department of Computer Science and Engineering, University of Calcutta and Kalyan Das,Department of Information Technology, St. Thomas College of Engineering and Technology Kolkata, India ; Kalyan Das, 1Department of Information Technology, St. Thomas College of Engineering and Technology Kolkata, India


RSA (Rivest Shamir Adleman Cryptographic Algorithm), IDEA (International Data Encryption Algorithm), Elliptic Curve Cryptography (ECC)


The need for a secured data transfer through the internet is most needed in today’s life. From Online Banking & Reservation software, Electronic Mails, Social Networking Sites to Governmental informative websites & cloud services, security is the main concern throughout. Quite accordingly, availability of a secure cryptographic algorithm commercially is also of premium importance. The project basically deals with analyzing the performances of two commonly used cryptographic algorithms and determining their resilience against Side Channel cryptanalysis, ascertaining whether a Side Channel cryptanalytic method on these algorithms is possible and finally, strengthening the algorithms against future cryptanalytic attacks. We took the famous asymmetric RSA algorithm for our initial analysis, followed by the symmetric IDEA cryptographic algorithm. The basic objectives were as follows: Monitoring and analyzing the performances of the specified algorithms in normal cases and when subjected to Side Channel cryptanalytic attacks, Devising and implementing a method for a Side Channel cryptanalytic attack on the above cryptographic algorithms, Using principles of Elliptic Curve Cryptography (ECC) to implement a method for strengthening the above cryptographic algorithms against possible Side Channel cryptanalytic attacks, wherein the inputs for the specified cryptographic algorithms was taken from an elliptic curve defined over a prime field.

Other Details:

Manuscript Id :J4RV2I5027
Published in :Volume : 2, Issue : 5
Publication Date: 01/08/2016
Page(s): 36-41
Download Article


Paper Submission

Dear Authors,
The Paper Submission for the Current Issue has started..

Submit Manuscript Online

ISSN Number:

The ISSN Number of Journal Is

2395 - 7549

Read More

Impact Factor

The Impact Factor of Journal Is


Click here


2395 - 7549



Creative Commons License