SlideShare a Scribd company logo
1 of 6
Download to read offline
TELKOMNIKA Indonesian Journal of Electrical Engineering
Vol.12, No.1, January 2014, pp. 269 ~ 274
DOI: http://dx.doi.org/10.11591/telkomnika.v12i1.3966  269
Received June 22, 2013; Revised August 14, 2013; Accepted September 16, 2013
Analysis of the Relationship between Hamming
Distance and the Electromagnetic Information Leakage
Zhang Jiemin*1
, Liu Jinming2
, Sun Haimeng3
, Mao Jian4
124
Computer Engineering College, Jimei University (JMU)
No.183 Yinjiang Rd, 361021 Jimei, Xiamen, Fujian, China, Ph./Fax: +86-592-6182451/6181601
3
Chengyi College, Jimei University (JMU)
No.185 Yinjiang Rd, 361021 Jimei, Xiamen, Fujian, China, Ph./Fax: +86-592-6182996/6182998
*Corresponding author, e-mail: zhangjm@jmu.edu.cn*
1
, liu_jinming@126.com
2
, haimes@163.com
3
,
myjeans@sina.com
4
Abstract
Electromagnetic information leak as a potential data security risk is more and more serious.
Discussing the relationship between compromising emanations and Hamming distance is directed to
preventing or reducing the electromagnetic information leakage. The paper presents the model of
electromagnetic information leak, then the hierarchical protection strategy based on the model is proposed,
that is anti-radiation, anti-intercept and anti-reconstruction. Analyzing the causes of electromagnetic
information leak through the touch screen case, the paper describes the electromagnetic radiation intensity
is correlated to the transition's Hamming distance. The paper presents the anti-intercept method, which is
reducing the Hamming distance of the sensitive data or keep Hamming distance constant in order to
reducing or preventing the electromagnetic information leakage. The anti-intercept method is available
showed as the touch screen case.
Keywords: Electromagnetic information leakage, hierarchical protection strategy, Hamming distance, data
security, anti-intercept
Copyright © 2014 Institute of Advanced Engineering and Science. All rights reserved.
1. Introduction
The safety of the information is more and more important, however the attack is
becoming more and more serious. Electromagnetic radiation as a potential computer security
risk is ignored while the people pay more attention to the network attack or virus.
As early as 1985, the concept of electromagnetic information leakage was brought
firstly to the attention of the broader public by Van Eck [1], [2], who showed that the screen
content of a cathode-ray tube (CRT) display can be reconstructed at a distance using a TV set
whose sync pulse generators are replaced with manually controlled oscillators.
In fact, the compromising emanations was discovered not only from video displays, but
also from CPU, mainbard, keyboard, printer, lines as power line, data wire, control line and so
on [3], even though the different components call for the different approaches to intercept and
reconstruct the original data [4].
With the wide application of computer technology, network technology and modern
communications technology in the various business, meanwhile with the advancement of
intercept techniques and reconstruct techniques, electromagnetic information leakage is very
grave. It has become an major way to obtain confidential information using electromagnetic
information leakage both here and abroad. All these developments make it necessary to
reevaluate the emission-security risks identified now.
It is presented in the paper that electromagnetic information leak is correlated to the
transition's Hamming distance. Study on the relationship between compromising emanations
and Hamming distance is directed to preventing or reducing the electromagnetic information
leakage.
2. The Model of Electromagnetic Information Leak
All electrical and electronic equipment produces electromagnetic radiation. The
electromagnetic signals propagate along electrically conductive pathways called conducted
 ISSN: 2302-4046
TELKOMNIKA Vol. 12, No. 1, January 2014: 269 – 274
270
emissions or through space called radiated emissions. Both the conducted emissions and the
radiated emissions will result in electromagnetic interference (EMI) and electromagnetic leak.
Electromagnetic leak is more severe rather than merely EMI. If these emissions are intercepted
and analyzed they could reveal confidential data that the signals contain. A receiving device can
intercept these signals without being detected even when located some distance away access
to the original equipment is not required. Electromagnetic radiation of the computer results in
electromagnetic information leak.
According to the electromagnetic radiation theory and information theory, it may be
considered that electromagnetic information leak system is composed of three parts that are
leak source (information source), electromagnetic radiation (information channel), interception
equipment (information sink), showed as Figure1.
 
   
 
Figure 1. Model of electromagnetic information leak
The research of electromagnetic information leak is based upon the model in this paper.
According the model, The three aspects of the source, channel and sink should be considered
to protect from electromagnetic information leakage. Thus the hierarchical protection strategy is
taken into account, that is anti-radiation, anti-intercept and anti-reconstruction, showed as
Figure 2.
Figure 2. Hierarchical protection model
anti-radiation: try to inhibit or block electromagnetic radiation in order to hold the
leakage as less as possible.
anti-intercept: try to make intercept more difficult in order to keep from capture as far as
possible.
anti-reconstruction: try to make reconstruction more difficult in order to keep from
reproduction as far as possible.
The Hamming distance of data processed in a computer have a certain relationship with
electromagnetic radiation intensity. It is possible to make intercept more difficult by adjusting the
Hamming distance of data so that prevent or reduce the electromagnetic information leakage.
3. Analyzing the Causes of Electromagnetic Information Leak
The construction of information equipment results in the cause why electromagnetic
radiation is associated with information leak. Most chips made for digital information devices are
TELKOMNIKA ISSN: 2302-4046 
Analysis of the Relationship between Hamming Distance and ... (Zhang Jiemin)
271
designed in CMOS technology, so these logic family has become dominant in very large scale
integrated circuits (VLSI), including inverter, NOR gate, NAND gate and so on. CMOS inverters
are the basic building-block of all digital CMOS logic. The inverter can be looked upon as a
push-pull switch: A "In" grounded cuts off the one transistor, pulling "Out" high. A high "In" does
the inverse, cuts off the another transistor , pulling "Out" to ground, showed as Figure 3.
Figure 3. Elementary CMOS gate
There are three kinds of current while CMOS gate works that are the static current,
dynamic short-circuit current and dynamic current as the capacitor C charging and discharging.
Power consumption or electromagnetic radiation intensity is mainly caused by dynamic current
because of static current only contributes less 15% [5], [6].
In particular, the dynamic short-circuit current results in the impulse. During a transition
from "0" to "1" or vice-versa, the device's n and p transistors are on for a short period of time.
This results in a short current pulse from Vdd to Vss. This sudden current pulse causes a sudden
variation of the electromagnetic field surrounding the chip which can be monitored by some
inductive equipments.
According to above analysis, in the case of inverse no matter "0→1" or " 1→0"
happened, electromagnetic information leak is there. Meanwhile the data "1" has the higher
power consumption than the data "0". Thus the power curve is correlated to the transition's
Hamming distance. This explains why the electromagnetic radiation curve is correlated to the
transition's Hamming distance and why electromagnetic information leakage when data flips.
Hamming distance is the number of different code value of corresponds to bits between
any two codeword in a data encoding set, as in (1).
(x, y) = x[i] y[i] (1)
Here is i=0,1,..n-1; x, y is n bits of code; ⊕ is exclusive or operator; H (x, y) is the
difference for x and y take 0 or 1 values, if x and y are binary codes.
The more the number of bits changed is, the more the power consumption is, and the
higher the electromagnetic radiation intensity is. The power consumption model can be build
based on Hamming distance, and then the electromagnetic radiation model can be build based
on Hamming distance [7], [8], as in (2).
C = a* H( D ⊕ R) + b (2)
In (2), C is the electromagnetic radiation; D is the original data, R is the result data; H is
Hamming weight; ⊕ is operator XOR. Then H(D ⊕ R)is the Hamming distance of D and R.
Let a = 1 and b = 0, then C is expressed simply as in (3).
 ISSN: 2302-4046
TELKOMNIKA Vol. 12, No. 1, January 2014: 269 – 274
272
C = H(D ⊕ R) (3)
The formula represents a series of changes in the relationship "Hamming distance of
data→power consumption→electromagnetic radiation".
Based on the analysis above, the power consumption is different while the information
equipments process the data of "0" or "1", leading to changes in intensity of electromagnetic
radiation and in electromagnetic signal. In particular, a bit of data transitions from "0" to "1" or
vice-versa results in a short current pulse from Vdd to Vss, then electromagnetic information
leakage can be captured through the method of DPA (Differential Power Analysis) [5]-[8] or EA
(Electromagnetic Analysis) [7] etc.
If reducing the Hamming distance of the sensitive data or keeping Hamming distance
constant, it will reduce the variation of electromagnetic wave radiated or keep the changes of
electromagnetic signal constant, then the interception is more difficult. So intercepting the
electromagnetic wave with information becomes more hardly.
4. Adjusting the Hamming Distance to Anti-Intercept
Touch screen monitors are widely used as an input device in an automatic teller
machine (ATM), a cash dispenser (CD), a door and gate access control terminal, mobile [9], and
so on. In the operation, the operator inputs often the certificate code by touching the numeric
and character button image. The touched button image then changes the color at one time to
inform the operator the input button key. The change of color of the touched button image is
widely general in the flow of input button key operations on touch screen monitors.
The standard color scheme of the touch screen monitors is showed as Figure 4.
Figure 4. Standard color scheme of a touch screen monitor
The image that touch screen monitors display can be reconstructed on a personal
computer with intercepting electromagnetic radiation [10]-[12]. If the change of color of the
touched button image can be distinguished in the reconstructed display image, the information
of input button key operations on touch screen monitors leaks from the electromagnetic
radiation [13].
The color change means that the data changes, it means the Hamming distance of data
is not 0 before and after touch the numeric button. There are changes in electromagnetic
radiation. Table 1 shows a touch screen standard color scheme and data encoding. The
calculations for the standard color scheme are summarized in Table 2 before and after touch
the numeric button.
TELKOMNIKA ISSN: 2302-4046 
Analysis of the Relationship between Hamming Distance and ... (Zhang Jiemin)
273
Table 1. Standard color scheme and data encoding
Numeric button No touched Touched
background color black [00H : 00H : 00H] black [00H : 00H : 00H]
image color green [00H: FFH : 00H] magenta [FFH : 00H : FFH]
digit color white [FFH : FFH: FFH] white [FFH : FFH: FFH]
Table 2. Hamming distance for standard color scheme before and after touch the numeric
button
Numeric button No touched Touched
color change of image [00H: 00H : 00H] →[00H :FFH : 00H] [00H :00H :00H] →[FFH :00H :FFH]
Hamming distance for image 8 16
color change of digit edge [00H :FFH :00H] → [FFH :FFH:FFH] [FFH :00H :FFH]→ [FFH :FFH:FFH]
Hamming distance for digit edge 16 8
The reason for the information leak of input button key operations on touch screen
monitors is investigated in Table 2.
Select cyan color ([00H : FFH : FFH]) as a different image color for touch button, called
anti-intercept color scheme showed as Figure 5, so that the Hamming distance of data is 0
before and after touch the numeric button.
Figure 5. Anti-intercept color scheme of a touch screen monitor
The calculations for the anti-intercept color scheme are summarized in Table 3 before
and after touch the numeric button.
Table 3. Hamming distance for anti-intercept color scheme before and after touch the numeric
button
Numeric button No touched Touched
color change of image [00H : 00H : 00H] →[00H : FFH : FFH] [00H:00H :00H] →[FFH :00H :FFH]
Hamming distance for image 16 16
color change of digit edge [00H : FFH : FFH] → [FFH :FFH:FFH] [FFH:00H :FFH]→ [FFH :FFH:FFH]
Hamming distance for digit edge 8 8
Compare the anti-intercept color scheme with the standard color scheme, showed as
Table 4, Either the Hamming distance for image or the Hamming distance for digit is constant
before and after touch the numeric button for the anti-intercept color scheme, it is 16 or 8
respectively.
 ISSN: 2302-4046
TELKOMNIKA Vol. 12, No. 1, January 2014: 269 – 274
274
Table 4. Hamming distance for anti-intercept color scheme and standard color scheme
Numeric button
Standard
Image
Standard Digit
edge
Anti-intercept Image
Anti-intercept
Digit edge
no touched 8 16 16 8
touched 16 8 16 8
difference -8 8 0 0
5. Conclusion
Because that the Hamming distance is constant, the electromagnetic radiation variation
maintains constant before and after touch a numeric button. It result in that can't determine
whether a numeric button is touched thereby protecting the password security. The anti-
intercept color scheme used in practical application, it is really difficult to capture and
reconstruct original data using electromagnetic radiation.
So adjusting the Hamming distance of data to make the electromagnetic radiation
variation is constant, can effectively prevent the electromagnetic information leakage, protect
the confidential data security. Adjusting the Hamming distance of data to make the
electromagnetic radiation variation is less, can effectively attenuate the electromagnetic
information leakage, protect the confidential data from attack.
References
[1] Markus G Kuhn. Compromising emanations: eavesdropping risks of computer displays. University of
Cambridge Computer Laboratory Technical Report. 2003; UCAM-CL-TR: 577-581.
[2] Van Eck W. Electromagnetic radiation from video display units: An eavesdropping risk?. Computers
and Security. 1985; 4(4): 269-286.
[3] CHU Jie, DING Guoliang, DENG Gaoming, ZHAO Qiang. Design and Realization of Differential Power
Analysis for DES, Department of Computer Engineering. Journal of Chinese Computer Systems.
2007; 1(28):11-14.
[4] Timo Kasper, David Oswald, and Christof Paar. EM Side-Channel Attacks on Commercial Contactless
Smartcards Using Low-Cost Equipment. Horst Görtz Institute for IT Security Ruhr University Bochum,
Germany, HY Youm and M Yung (Eds.): WISA 2009: LNCS 5932: 79-93.
[5] DING Guoliang, CHANG Xiaolong, CHENG Jiawen, WU Cuixi. The Electromagnetic Information
Leakage Evaluation on Basic CMOS Gate. Microelectronics & Computer. 2011; 28(5): 67-70.
[6] ZHANG Jingjing, LI Renfa, LI Lang, ZENG Qingguang. Research and realization of simulation of DES
differential power analysis attack. Computer Englneering and Applications. 2010; 46(33): 82-84.
[7] Karine Gandol, Christophe Mourtel, and Francis Olivier. Electromagnetic Analysis: Concrete Results,
Hardware and Embedded Systems. Computer Science. 2001; Lecture Notes (2162): 251-262.
[8] LU Chang, PAN Xiong. Research on the selection function in diferential power analysis. Information
Technology. 2012; 3: 108-110.
[9] Emy Setyaningsih, Catur Iswahyudi. Image Encryption on Mobile Phone Using Super Encryption
Algorithm. TELKOMNIKA Telecommunication Computing Electronics and Control. 2012; 10(4): 837-
845.
[10] Hidenori Sekiguchi, Shinji Seto. Measurement of Radiated Computer RGB signals. Progress In
Electromagnetics Research C. 2009; 7(C): 1-12.
[11] Hidenori Sekiguchi, Shinji Seto. Measurement of Computer RGB signals in Conducted Emission on
Power Leads. Progress In Electromagnetics Research. 2009; 7(C): 51-64.
[12] Hidenori Sekiguchi. Information leakage of input operation on touch screen monitors caused by
electromagnetic noise. IEEE 978-1-4244-6307-72010.
[13] Deris Stiawan, Mohd Yazid Idris, Abdul Hanan Abdullah. Attack and Vulnerability Penetration Testing:
FreeBSD. TELKOMNIKA Indonesian Journal of Electrical Engineering. 2013; 11(2): 399-408.

More Related Content

What's hot

Ultra short multi soliton generation for application in long distance communi...
Ultra short multi soliton generation for application in long distance communi...Ultra short multi soliton generation for application in long distance communi...
Ultra short multi soliton generation for application in long distance communi...University of Malaya (UM)
 
Design and simulation of optical power splitter with s bend using silicon on ...
Design and simulation of optical power splitter with s bend using silicon on ...Design and simulation of optical power splitter with s bend using silicon on ...
Design and simulation of optical power splitter with s bend using silicon on ...IAEME Publication
 
Electro magnetic interference and compatibility(ECM,ECI)
Electro magnetic interference and compatibility(ECM,ECI)Electro magnetic interference and compatibility(ECM,ECI)
Electro magnetic interference and compatibility(ECM,ECI)Palani murugan
 
1 s2.0-s1876610211018820-main
1 s2.0-s1876610211018820-main1 s2.0-s1876610211018820-main
1 s2.0-s1876610211018820-mainDeny Saputro
 
Impact and analytical study of the patch and slot for antenna design
Impact and analytical study of the patch and slot for antenna designImpact and analytical study of the patch and slot for antenna design
Impact and analytical study of the patch and slot for antenna designeSAT Journals
 
Magneto Optic Current Transformer Technology (MOCT)
Magneto Optic Current Transformer Technology (MOCT)Magneto Optic Current Transformer Technology (MOCT)
Magneto Optic Current Transformer Technology (MOCT)IOSRJEEE
 
MAGNETIC OPTICAL CURRENT TRANSFORMER
MAGNETIC OPTICAL CURRENT TRANSFORMERMAGNETIC OPTICAL CURRENT TRANSFORMER
MAGNETIC OPTICAL CURRENT TRANSFORMERMuhammad Afzal
 
MOCT (magneto optical current transformer)- presentation
 MOCT (magneto optical current transformer)- presentation MOCT (magneto optical current transformer)- presentation
MOCT (magneto optical current transformer)- presentationUjjwal Singh
 
Effect of fiber and solenoid variation parameters on the elements of a correc...
Effect of fiber and solenoid variation parameters on the elements of a correc...Effect of fiber and solenoid variation parameters on the elements of a correc...
Effect of fiber and solenoid variation parameters on the elements of a correc...IJECEIAES
 
Nonlinear chaotic signals generation and transmission within an optical fiber...
Nonlinear chaotic signals generation and transmission within an optical fiber...Nonlinear chaotic signals generation and transmission within an optical fiber...
Nonlinear chaotic signals generation and transmission within an optical fiber...University of Malaya (UM)
 
IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...
IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...
IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...IRJET Journal
 
Magneto-optic-current-transformer
Magneto-optic-current-transformerMagneto-optic-current-transformer
Magneto-optic-current-transformerSushovan Bej
 
Performance analysis of dwdm based fiber optic communication with different m...
Performance analysis of dwdm based fiber optic communication with different m...Performance analysis of dwdm based fiber optic communication with different m...
Performance analysis of dwdm based fiber optic communication with different m...eSAT Journals
 
New system of chaotic signal generation based on coupling coefficients applie...
New system of chaotic signal generation based on coupling coefficients applie...New system of chaotic signal generation based on coupling coefficients applie...
New system of chaotic signal generation based on coupling coefficients applie...University of Malaya (UM)
 
Implementation of hummingbird cryptographic algorithm for low cost rfid tags ...
Implementation of hummingbird cryptographic algorithm for low cost rfid tags ...Implementation of hummingbird cryptographic algorithm for low cost rfid tags ...
Implementation of hummingbird cryptographic algorithm for low cost rfid tags ...eSAT Journals
 
Magneto optics applications
Magneto optics applicationsMagneto optics applications
Magneto optics applicationsMarco Koschny
 

What's hot (20)

F010314247
F010314247F010314247
F010314247
 
Ultra short multi soliton generation for application in long distance communi...
Ultra short multi soliton generation for application in long distance communi...Ultra short multi soliton generation for application in long distance communi...
Ultra short multi soliton generation for application in long distance communi...
 
Db4301594597
Db4301594597Db4301594597
Db4301594597
 
Design and simulation of optical power splitter with s bend using silicon on ...
Design and simulation of optical power splitter with s bend using silicon on ...Design and simulation of optical power splitter with s bend using silicon on ...
Design and simulation of optical power splitter with s bend using silicon on ...
 
Electro magnetic interference and compatibility(ECM,ECI)
Electro magnetic interference and compatibility(ECM,ECI)Electro magnetic interference and compatibility(ECM,ECI)
Electro magnetic interference and compatibility(ECM,ECI)
 
1 s2.0-s1876610211018820-main
1 s2.0-s1876610211018820-main1 s2.0-s1876610211018820-main
1 s2.0-s1876610211018820-main
 
Impact and analytical study of the patch and slot for antenna design
Impact and analytical study of the patch and slot for antenna designImpact and analytical study of the patch and slot for antenna design
Impact and analytical study of the patch and slot for antenna design
 
Magneto Optic Current Transformer Technology (MOCT)
Magneto Optic Current Transformer Technology (MOCT)Magneto Optic Current Transformer Technology (MOCT)
Magneto Optic Current Transformer Technology (MOCT)
 
MAGNETIC OPTICAL CURRENT TRANSFORMER
MAGNETIC OPTICAL CURRENT TRANSFORMERMAGNETIC OPTICAL CURRENT TRANSFORMER
MAGNETIC OPTICAL CURRENT TRANSFORMER
 
MOCT (magneto optical current transformer)- presentation
 MOCT (magneto optical current transformer)- presentation MOCT (magneto optical current transformer)- presentation
MOCT (magneto optical current transformer)- presentation
 
40220140503001
4022014050300140220140503001
40220140503001
 
Effect of fiber and solenoid variation parameters on the elements of a correc...
Effect of fiber and solenoid variation parameters on the elements of a correc...Effect of fiber and solenoid variation parameters on the elements of a correc...
Effect of fiber and solenoid variation parameters on the elements of a correc...
 
Nonlinear chaotic signals generation and transmission within an optical fiber...
Nonlinear chaotic signals generation and transmission within an optical fiber...Nonlinear chaotic signals generation and transmission within an optical fiber...
Nonlinear chaotic signals generation and transmission within an optical fiber...
 
IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...
IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...
IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...
 
Magneto-optic-current-transformer
Magneto-optic-current-transformerMagneto-optic-current-transformer
Magneto-optic-current-transformer
 
Performance analysis of dwdm based fiber optic communication with different m...
Performance analysis of dwdm based fiber optic communication with different m...Performance analysis of dwdm based fiber optic communication with different m...
Performance analysis of dwdm based fiber optic communication with different m...
 
New system of chaotic signal generation based on coupling coefficients applie...
New system of chaotic signal generation based on coupling coefficients applie...New system of chaotic signal generation based on coupling coefficients applie...
New system of chaotic signal generation based on coupling coefficients applie...
 
Implementation of hummingbird cryptographic algorithm for low cost rfid tags ...
Implementation of hummingbird cryptographic algorithm for low cost rfid tags ...Implementation of hummingbird cryptographic algorithm for low cost rfid tags ...
Implementation of hummingbird cryptographic algorithm for low cost rfid tags ...
 
Magneto optics applications
Magneto optics applicationsMagneto optics applications
Magneto optics applications
 
1 ijcse-01179-6
1 ijcse-01179-61 ijcse-01179-6
1 ijcse-01179-6
 

Similar to Analysis of the Relationship between Hamming Distance and the Electromagnetic Information Leakage

Paper id 24201478
Paper id 24201478Paper id 24201478
Paper id 24201478IJRAT
 
Wireless power transfer using the concept of magnetic coil resonant system
Wireless power transfer using the concept of magnetic coil resonant systemWireless power transfer using the concept of magnetic coil resonant system
Wireless power transfer using the concept of magnetic coil resonant systemTELKOMNIKA JOURNAL
 
Unconsidered but influencing interference in unmanned aerial vehicle cabling ...
Unconsidered but influencing interference in unmanned aerial vehicle cabling ...Unconsidered but influencing interference in unmanned aerial vehicle cabling ...
Unconsidered but influencing interference in unmanned aerial vehicle cabling ...IJECEIAES
 
Magnetic resonance coupling for 5G WPT applications
Magnetic resonance coupling for 5G WPT applicationsMagnetic resonance coupling for 5G WPT applications
Magnetic resonance coupling for 5G WPT applicationsjournalBEEI
 
Wireless Power Transmission System A Review
Wireless Power Transmission System A ReviewWireless Power Transmission System A Review
Wireless Power Transmission System A Reviewijtsrd
 
Enhancement algorithm for reverse loop technique on planar reverse loop antenna
Enhancement algorithm for reverse loop technique on planar reverse loop antennaEnhancement algorithm for reverse loop technique on planar reverse loop antenna
Enhancement algorithm for reverse loop technique on planar reverse loop antennaTELKOMNIKA JOURNAL
 
Advance communication through red tacton human area networking technology
Advance communication through red tacton  human area networking technology Advance communication through red tacton  human area networking technology
Advance communication through red tacton human area networking technology Pawan Sharma
 
Development of a Wireless Power Transfer Circuit Based on Inductive Coupling
Development of a Wireless Power Transfer Circuit Based on Inductive CouplingDevelopment of a Wireless Power Transfer Circuit Based on Inductive Coupling
Development of a Wireless Power Transfer Circuit Based on Inductive CouplingTELKOMNIKA JOURNAL
 
Fundamentals of electromagnetic compatibility (EMC)
Fundamentals of electromagnetic compatibility (EMC)Fundamentals of electromagnetic compatibility (EMC)
Fundamentals of electromagnetic compatibility (EMC)Bruno De Wachter
 
Survey on Red Tacton Technology for Human Area Network
Survey on Red Tacton Technology for Human Area NetworkSurvey on Red Tacton Technology for Human Area Network
Survey on Red Tacton Technology for Human Area NetworkIOSR Journals
 
The influence of EMF (electro magnetic field) on data center
The influence of EMF (electro magnetic field) on data centerThe influence of EMF (electro magnetic field) on data center
The influence of EMF (electro magnetic field) on data centerEdarat Group
 
Saving of Power in Wireless Power Transmission System using IR Sensor and Relay
Saving of Power in Wireless Power Transmission System using IR Sensor and RelaySaving of Power in Wireless Power Transmission System using IR Sensor and Relay
Saving of Power in Wireless Power Transmission System using IR Sensor and RelayDr. Amarjeet Singh
 
Single electron transistor technology based on chip implementation of smoke d...
Single electron transistor technology based on chip implementation of smoke d...Single electron transistor technology based on chip implementation of smoke d...
Single electron transistor technology based on chip implementation of smoke d...eSAT Publishing House
 
322253456-NANOELECTRONICS-ppt of engineering
322253456-NANOELECTRONICS-ppt of engineering322253456-NANOELECTRONICS-ppt of engineering
322253456-NANOELECTRONICS-ppt of engineeringt24042567
 
Magnetic resonance coupling wireless power transfer for green technologies
Magnetic resonance coupling wireless power transfer for green  technologiesMagnetic resonance coupling wireless power transfer for green  technologies
Magnetic resonance coupling wireless power transfer for green technologiesawszuher
 

Similar to Analysis of the Relationship between Hamming Distance and the Electromagnetic Information Leakage (20)

Paper id 24201478
Paper id 24201478Paper id 24201478
Paper id 24201478
 
Wireless power transfer using the concept of magnetic coil resonant system
Wireless power transfer using the concept of magnetic coil resonant systemWireless power transfer using the concept of magnetic coil resonant system
Wireless power transfer using the concept of magnetic coil resonant system
 
Unconsidered but influencing interference in unmanned aerial vehicle cabling ...
Unconsidered but influencing interference in unmanned aerial vehicle cabling ...Unconsidered but influencing interference in unmanned aerial vehicle cabling ...
Unconsidered but influencing interference in unmanned aerial vehicle cabling ...
 
Magnetic resonance coupling for 5G WPT applications
Magnetic resonance coupling for 5G WPT applicationsMagnetic resonance coupling for 5G WPT applications
Magnetic resonance coupling for 5G WPT applications
 
Wireless Power Transmission System A Review
Wireless Power Transmission System A ReviewWireless Power Transmission System A Review
Wireless Power Transmission System A Review
 
Why studyemt
Why studyemtWhy studyemt
Why studyemt
 
Enhancement algorithm for reverse loop technique on planar reverse loop antenna
Enhancement algorithm for reverse loop technique on planar reverse loop antennaEnhancement algorithm for reverse loop technique on planar reverse loop antenna
Enhancement algorithm for reverse loop technique on planar reverse loop antenna
 
Lecture no.1 emi new
Lecture no.1 emi newLecture no.1 emi new
Lecture no.1 emi new
 
Advance communication through red tacton human area networking technology
Advance communication through red tacton  human area networking technology Advance communication through red tacton  human area networking technology
Advance communication through red tacton human area networking technology
 
Development of a Wireless Power Transfer Circuit Based on Inductive Coupling
Development of a Wireless Power Transfer Circuit Based on Inductive CouplingDevelopment of a Wireless Power Transfer Circuit Based on Inductive Coupling
Development of a Wireless Power Transfer Circuit Based on Inductive Coupling
 
Fundamentals of electromagnetic compatibility (EMC)
Fundamentals of electromagnetic compatibility (EMC)Fundamentals of electromagnetic compatibility (EMC)
Fundamentals of electromagnetic compatibility (EMC)
 
Survey on Red Tacton Technology for Human Area Network
Survey on Red Tacton Technology for Human Area NetworkSurvey on Red Tacton Technology for Human Area Network
Survey on Red Tacton Technology for Human Area Network
 
The influence of EMF (electro magnetic field) on data center
The influence of EMF (electro magnetic field) on data centerThe influence of EMF (electro magnetic field) on data center
The influence of EMF (electro magnetic field) on data center
 
No wire
No wire No wire
No wire
 
S0735272711100074_preview
S0735272711100074_previewS0735272711100074_preview
S0735272711100074_preview
 
Saving of Power in Wireless Power Transmission System using IR Sensor and Relay
Saving of Power in Wireless Power Transmission System using IR Sensor and RelaySaving of Power in Wireless Power Transmission System using IR Sensor and Relay
Saving of Power in Wireless Power Transmission System using IR Sensor and Relay
 
Single electron transistor technology based on chip implementation of smoke d...
Single electron transistor technology based on chip implementation of smoke d...Single electron transistor technology based on chip implementation of smoke d...
Single electron transistor technology based on chip implementation of smoke d...
 
322253456-NANOELECTRONICS-ppt of engineering
322253456-NANOELECTRONICS-ppt of engineering322253456-NANOELECTRONICS-ppt of engineering
322253456-NANOELECTRONICS-ppt of engineering
 
Magnetic resonance coupling wireless power transfer for green technologies
Magnetic resonance coupling wireless power transfer for green  technologiesMagnetic resonance coupling wireless power transfer for green  technologies
Magnetic resonance coupling wireless power transfer for green technologies
 
40220140506001
4022014050600140220140506001
40220140506001
 

More from Nooria Sukmaningtyas

Technology Content Analysis with Technometric Theory Approach to Improve Perf...
Technology Content Analysis with Technometric Theory Approach to Improve Perf...Technology Content Analysis with Technometric Theory Approach to Improve Perf...
Technology Content Analysis with Technometric Theory Approach to Improve Perf...Nooria Sukmaningtyas
 
Data Exchange Design with SDMX Format for Interoperability Statistical Data
Data Exchange Design with SDMX Format for Interoperability Statistical DataData Exchange Design with SDMX Format for Interoperability Statistical Data
Data Exchange Design with SDMX Format for Interoperability Statistical DataNooria Sukmaningtyas
 
The Knowledge Management System of A State Loss Settlement
The Knowledge Management System of A State Loss SettlementThe Knowledge Management System of A State Loss Settlement
The Knowledge Management System of A State Loss SettlementNooria Sukmaningtyas
 
Automatic Extraction of Diaphragm Motion and Respiratory Pattern from Time-se...
Automatic Extraction of Diaphragm Motion and Respiratory Pattern from Time-se...Automatic Extraction of Diaphragm Motion and Respiratory Pattern from Time-se...
Automatic Extraction of Diaphragm Motion and Respiratory Pattern from Time-se...Nooria Sukmaningtyas
 
U-slot Circular Patch Antenna for WLAN Application
U-slot Circular Patch Antenna for WLAN ApplicationU-slot Circular Patch Antenna for WLAN Application
U-slot Circular Patch Antenna for WLAN ApplicationNooria Sukmaningtyas
 
The Detection of Straight and Slant Wood Fiber through Slop Angle Fiber Feature
The Detection of Straight and Slant Wood Fiber through Slop Angle Fiber FeatureThe Detection of Straight and Slant Wood Fiber through Slop Angle Fiber Feature
The Detection of Straight and Slant Wood Fiber through Slop Angle Fiber FeatureNooria Sukmaningtyas
 
Active Infrared Night Vision System of Agricultural Vehicles
Active Infrared Night Vision System of Agricultural VehiclesActive Infrared Night Vision System of Agricultural Vehicles
Active Infrared Night Vision System of Agricultural VehiclesNooria Sukmaningtyas
 
Robot Three Dimensional Space Path-planning Applying the Improved Ant Colony ...
Robot Three Dimensional Space Path-planning Applying the Improved Ant Colony ...Robot Three Dimensional Space Path-planning Applying the Improved Ant Colony ...
Robot Three Dimensional Space Path-planning Applying the Improved Ant Colony ...Nooria Sukmaningtyas
 
Research on a Kind of PLC Based Fuzzy-PID Controller with Adjustable Factor
Research on a Kind of PLC Based Fuzzy-PID Controller with Adjustable FactorResearch on a Kind of PLC Based Fuzzy-PID Controller with Adjustable Factor
Research on a Kind of PLC Based Fuzzy-PID Controller with Adjustable FactorNooria Sukmaningtyas
 
Nonlinear Robust Control for Spacecraft Attitude
Nonlinear Robust Control for Spacecraft AttitudeNonlinear Robust Control for Spacecraft Attitude
Nonlinear Robust Control for Spacecraft AttitudeNooria Sukmaningtyas
 
Remote Monitoring System for Communication Base Based on Short Message
Remote Monitoring System for Communication Base Based on Short MessageRemote Monitoring System for Communication Base Based on Short Message
Remote Monitoring System for Communication Base Based on Short MessageNooria Sukmaningtyas
 
Tele-Robotic Assisted Dental Implant Surgery with Virtual Force Feedback
Tele-Robotic Assisted Dental Implant Surgery with Virtual Force FeedbackTele-Robotic Assisted Dental Implant Surgery with Virtual Force Feedback
Tele-Robotic Assisted Dental Implant Surgery with Virtual Force FeedbackNooria Sukmaningtyas
 
Research on Adaptation of Service-based Business Processes
Research on Adaptation of Service-based Business ProcessesResearch on Adaptation of Service-based Business Processes
Research on Adaptation of Service-based Business ProcessesNooria Sukmaningtyas
 
Review on Islanding Detection Methods for Photovoltaic Inverter
Review on Islanding Detection Methods for Photovoltaic InverterReview on Islanding Detection Methods for Photovoltaic Inverter
Review on Islanding Detection Methods for Photovoltaic InverterNooria Sukmaningtyas
 
Stabilizing Planar Inverted Pendulum System Based on Fuzzy Nine-point Controller
Stabilizing Planar Inverted Pendulum System Based on Fuzzy Nine-point ControllerStabilizing Planar Inverted Pendulum System Based on Fuzzy Nine-point Controller
Stabilizing Planar Inverted Pendulum System Based on Fuzzy Nine-point ControllerNooria Sukmaningtyas
 
Gross Error Elimination Based on the Polynomial Least Square Method in Integr...
Gross Error Elimination Based on the Polynomial Least Square Method in Integr...Gross Error Elimination Based on the Polynomial Least Square Method in Integr...
Gross Error Elimination Based on the Polynomial Least Square Method in Integr...Nooria Sukmaningtyas
 
Design on the Time-domain Airborne Electromagnetic Weak Signal Data Acquisiti...
Design on the Time-domain Airborne Electromagnetic Weak Signal Data Acquisiti...Design on the Time-domain Airborne Electromagnetic Weak Signal Data Acquisiti...
Design on the Time-domain Airborne Electromagnetic Weak Signal Data Acquisiti...Nooria Sukmaningtyas
 
INS/GPS Integrated Navigation Technology for Hypersonic UAV
INS/GPS Integrated Navigation Technology for Hypersonic UAVINS/GPS Integrated Navigation Technology for Hypersonic UAV
INS/GPS Integrated Navigation Technology for Hypersonic UAVNooria Sukmaningtyas
 
Research on Space Target Recognition Algorithm Based on Empirical Mode Decomp...
Research on Space Target Recognition Algorithm Based on Empirical Mode Decomp...Research on Space Target Recognition Algorithm Based on Empirical Mode Decomp...
Research on Space Target Recognition Algorithm Based on Empirical Mode Decomp...Nooria Sukmaningtyas
 
An Improved AC-BM Algorithm for Monitoring Watch List
An Improved AC-BM Algorithm for Monitoring Watch ListAn Improved AC-BM Algorithm for Monitoring Watch List
An Improved AC-BM Algorithm for Monitoring Watch ListNooria Sukmaningtyas
 

More from Nooria Sukmaningtyas (20)

Technology Content Analysis with Technometric Theory Approach to Improve Perf...
Technology Content Analysis with Technometric Theory Approach to Improve Perf...Technology Content Analysis with Technometric Theory Approach to Improve Perf...
Technology Content Analysis with Technometric Theory Approach to Improve Perf...
 
Data Exchange Design with SDMX Format for Interoperability Statistical Data
Data Exchange Design with SDMX Format for Interoperability Statistical DataData Exchange Design with SDMX Format for Interoperability Statistical Data
Data Exchange Design with SDMX Format for Interoperability Statistical Data
 
The Knowledge Management System of A State Loss Settlement
The Knowledge Management System of A State Loss SettlementThe Knowledge Management System of A State Loss Settlement
The Knowledge Management System of A State Loss Settlement
 
Automatic Extraction of Diaphragm Motion and Respiratory Pattern from Time-se...
Automatic Extraction of Diaphragm Motion and Respiratory Pattern from Time-se...Automatic Extraction of Diaphragm Motion and Respiratory Pattern from Time-se...
Automatic Extraction of Diaphragm Motion and Respiratory Pattern from Time-se...
 
U-slot Circular Patch Antenna for WLAN Application
U-slot Circular Patch Antenna for WLAN ApplicationU-slot Circular Patch Antenna for WLAN Application
U-slot Circular Patch Antenna for WLAN Application
 
The Detection of Straight and Slant Wood Fiber through Slop Angle Fiber Feature
The Detection of Straight and Slant Wood Fiber through Slop Angle Fiber FeatureThe Detection of Straight and Slant Wood Fiber through Slop Angle Fiber Feature
The Detection of Straight and Slant Wood Fiber through Slop Angle Fiber Feature
 
Active Infrared Night Vision System of Agricultural Vehicles
Active Infrared Night Vision System of Agricultural VehiclesActive Infrared Night Vision System of Agricultural Vehicles
Active Infrared Night Vision System of Agricultural Vehicles
 
Robot Three Dimensional Space Path-planning Applying the Improved Ant Colony ...
Robot Three Dimensional Space Path-planning Applying the Improved Ant Colony ...Robot Three Dimensional Space Path-planning Applying the Improved Ant Colony ...
Robot Three Dimensional Space Path-planning Applying the Improved Ant Colony ...
 
Research on a Kind of PLC Based Fuzzy-PID Controller with Adjustable Factor
Research on a Kind of PLC Based Fuzzy-PID Controller with Adjustable FactorResearch on a Kind of PLC Based Fuzzy-PID Controller with Adjustable Factor
Research on a Kind of PLC Based Fuzzy-PID Controller with Adjustable Factor
 
Nonlinear Robust Control for Spacecraft Attitude
Nonlinear Robust Control for Spacecraft AttitudeNonlinear Robust Control for Spacecraft Attitude
Nonlinear Robust Control for Spacecraft Attitude
 
Remote Monitoring System for Communication Base Based on Short Message
Remote Monitoring System for Communication Base Based on Short MessageRemote Monitoring System for Communication Base Based on Short Message
Remote Monitoring System for Communication Base Based on Short Message
 
Tele-Robotic Assisted Dental Implant Surgery with Virtual Force Feedback
Tele-Robotic Assisted Dental Implant Surgery with Virtual Force FeedbackTele-Robotic Assisted Dental Implant Surgery with Virtual Force Feedback
Tele-Robotic Assisted Dental Implant Surgery with Virtual Force Feedback
 
Research on Adaptation of Service-based Business Processes
Research on Adaptation of Service-based Business ProcessesResearch on Adaptation of Service-based Business Processes
Research on Adaptation of Service-based Business Processes
 
Review on Islanding Detection Methods for Photovoltaic Inverter
Review on Islanding Detection Methods for Photovoltaic InverterReview on Islanding Detection Methods for Photovoltaic Inverter
Review on Islanding Detection Methods for Photovoltaic Inverter
 
Stabilizing Planar Inverted Pendulum System Based on Fuzzy Nine-point Controller
Stabilizing Planar Inverted Pendulum System Based on Fuzzy Nine-point ControllerStabilizing Planar Inverted Pendulum System Based on Fuzzy Nine-point Controller
Stabilizing Planar Inverted Pendulum System Based on Fuzzy Nine-point Controller
 
Gross Error Elimination Based on the Polynomial Least Square Method in Integr...
Gross Error Elimination Based on the Polynomial Least Square Method in Integr...Gross Error Elimination Based on the Polynomial Least Square Method in Integr...
Gross Error Elimination Based on the Polynomial Least Square Method in Integr...
 
Design on the Time-domain Airborne Electromagnetic Weak Signal Data Acquisiti...
Design on the Time-domain Airborne Electromagnetic Weak Signal Data Acquisiti...Design on the Time-domain Airborne Electromagnetic Weak Signal Data Acquisiti...
Design on the Time-domain Airborne Electromagnetic Weak Signal Data Acquisiti...
 
INS/GPS Integrated Navigation Technology for Hypersonic UAV
INS/GPS Integrated Navigation Technology for Hypersonic UAVINS/GPS Integrated Navigation Technology for Hypersonic UAV
INS/GPS Integrated Navigation Technology for Hypersonic UAV
 
Research on Space Target Recognition Algorithm Based on Empirical Mode Decomp...
Research on Space Target Recognition Algorithm Based on Empirical Mode Decomp...Research on Space Target Recognition Algorithm Based on Empirical Mode Decomp...
Research on Space Target Recognition Algorithm Based on Empirical Mode Decomp...
 
An Improved AC-BM Algorithm for Monitoring Watch List
An Improved AC-BM Algorithm for Monitoring Watch ListAn Improved AC-BM Algorithm for Monitoring Watch List
An Improved AC-BM Algorithm for Monitoring Watch List
 

Recently uploaded

AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilVinayVitekari
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersMairaAshraf6
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxchumtiyababu
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 

Recently uploaded (20)

AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 

Analysis of the Relationship between Hamming Distance and the Electromagnetic Information Leakage

  • 1. TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.1, January 2014, pp. 269 ~ 274 DOI: http://dx.doi.org/10.11591/telkomnika.v12i1.3966  269 Received June 22, 2013; Revised August 14, 2013; Accepted September 16, 2013 Analysis of the Relationship between Hamming Distance and the Electromagnetic Information Leakage Zhang Jiemin*1 , Liu Jinming2 , Sun Haimeng3 , Mao Jian4 124 Computer Engineering College, Jimei University (JMU) No.183 Yinjiang Rd, 361021 Jimei, Xiamen, Fujian, China, Ph./Fax: +86-592-6182451/6181601 3 Chengyi College, Jimei University (JMU) No.185 Yinjiang Rd, 361021 Jimei, Xiamen, Fujian, China, Ph./Fax: +86-592-6182996/6182998 *Corresponding author, e-mail: zhangjm@jmu.edu.cn* 1 , liu_jinming@126.com 2 , haimes@163.com 3 , myjeans@sina.com 4 Abstract Electromagnetic information leak as a potential data security risk is more and more serious. Discussing the relationship between compromising emanations and Hamming distance is directed to preventing or reducing the electromagnetic information leakage. The paper presents the model of electromagnetic information leak, then the hierarchical protection strategy based on the model is proposed, that is anti-radiation, anti-intercept and anti-reconstruction. Analyzing the causes of electromagnetic information leak through the touch screen case, the paper describes the electromagnetic radiation intensity is correlated to the transition's Hamming distance. The paper presents the anti-intercept method, which is reducing the Hamming distance of the sensitive data or keep Hamming distance constant in order to reducing or preventing the electromagnetic information leakage. The anti-intercept method is available showed as the touch screen case. Keywords: Electromagnetic information leakage, hierarchical protection strategy, Hamming distance, data security, anti-intercept Copyright © 2014 Institute of Advanced Engineering and Science. All rights reserved. 1. Introduction The safety of the information is more and more important, however the attack is becoming more and more serious. Electromagnetic radiation as a potential computer security risk is ignored while the people pay more attention to the network attack or virus. As early as 1985, the concept of electromagnetic information leakage was brought firstly to the attention of the broader public by Van Eck [1], [2], who showed that the screen content of a cathode-ray tube (CRT) display can be reconstructed at a distance using a TV set whose sync pulse generators are replaced with manually controlled oscillators. In fact, the compromising emanations was discovered not only from video displays, but also from CPU, mainbard, keyboard, printer, lines as power line, data wire, control line and so on [3], even though the different components call for the different approaches to intercept and reconstruct the original data [4]. With the wide application of computer technology, network technology and modern communications technology in the various business, meanwhile with the advancement of intercept techniques and reconstruct techniques, electromagnetic information leakage is very grave. It has become an major way to obtain confidential information using electromagnetic information leakage both here and abroad. All these developments make it necessary to reevaluate the emission-security risks identified now. It is presented in the paper that electromagnetic information leak is correlated to the transition's Hamming distance. Study on the relationship between compromising emanations and Hamming distance is directed to preventing or reducing the electromagnetic information leakage. 2. The Model of Electromagnetic Information Leak All electrical and electronic equipment produces electromagnetic radiation. The electromagnetic signals propagate along electrically conductive pathways called conducted
  • 2.  ISSN: 2302-4046 TELKOMNIKA Vol. 12, No. 1, January 2014: 269 – 274 270 emissions or through space called radiated emissions. Both the conducted emissions and the radiated emissions will result in electromagnetic interference (EMI) and electromagnetic leak. Electromagnetic leak is more severe rather than merely EMI. If these emissions are intercepted and analyzed they could reveal confidential data that the signals contain. A receiving device can intercept these signals without being detected even when located some distance away access to the original equipment is not required. Electromagnetic radiation of the computer results in electromagnetic information leak. According to the electromagnetic radiation theory and information theory, it may be considered that electromagnetic information leak system is composed of three parts that are leak source (information source), electromagnetic radiation (information channel), interception equipment (information sink), showed as Figure1.         Figure 1. Model of electromagnetic information leak The research of electromagnetic information leak is based upon the model in this paper. According the model, The three aspects of the source, channel and sink should be considered to protect from electromagnetic information leakage. Thus the hierarchical protection strategy is taken into account, that is anti-radiation, anti-intercept and anti-reconstruction, showed as Figure 2. Figure 2. Hierarchical protection model anti-radiation: try to inhibit or block electromagnetic radiation in order to hold the leakage as less as possible. anti-intercept: try to make intercept more difficult in order to keep from capture as far as possible. anti-reconstruction: try to make reconstruction more difficult in order to keep from reproduction as far as possible. The Hamming distance of data processed in a computer have a certain relationship with electromagnetic radiation intensity. It is possible to make intercept more difficult by adjusting the Hamming distance of data so that prevent or reduce the electromagnetic information leakage. 3. Analyzing the Causes of Electromagnetic Information Leak The construction of information equipment results in the cause why electromagnetic radiation is associated with information leak. Most chips made for digital information devices are
  • 3. TELKOMNIKA ISSN: 2302-4046  Analysis of the Relationship between Hamming Distance and ... (Zhang Jiemin) 271 designed in CMOS technology, so these logic family has become dominant in very large scale integrated circuits (VLSI), including inverter, NOR gate, NAND gate and so on. CMOS inverters are the basic building-block of all digital CMOS logic. The inverter can be looked upon as a push-pull switch: A "In" grounded cuts off the one transistor, pulling "Out" high. A high "In" does the inverse, cuts off the another transistor , pulling "Out" to ground, showed as Figure 3. Figure 3. Elementary CMOS gate There are three kinds of current while CMOS gate works that are the static current, dynamic short-circuit current and dynamic current as the capacitor C charging and discharging. Power consumption or electromagnetic radiation intensity is mainly caused by dynamic current because of static current only contributes less 15% [5], [6]. In particular, the dynamic short-circuit current results in the impulse. During a transition from "0" to "1" or vice-versa, the device's n and p transistors are on for a short period of time. This results in a short current pulse from Vdd to Vss. This sudden current pulse causes a sudden variation of the electromagnetic field surrounding the chip which can be monitored by some inductive equipments. According to above analysis, in the case of inverse no matter "0→1" or " 1→0" happened, electromagnetic information leak is there. Meanwhile the data "1" has the higher power consumption than the data "0". Thus the power curve is correlated to the transition's Hamming distance. This explains why the electromagnetic radiation curve is correlated to the transition's Hamming distance and why electromagnetic information leakage when data flips. Hamming distance is the number of different code value of corresponds to bits between any two codeword in a data encoding set, as in (1). (x, y) = x[i] y[i] (1) Here is i=0,1,..n-1; x, y is n bits of code; ⊕ is exclusive or operator; H (x, y) is the difference for x and y take 0 or 1 values, if x and y are binary codes. The more the number of bits changed is, the more the power consumption is, and the higher the electromagnetic radiation intensity is. The power consumption model can be build based on Hamming distance, and then the electromagnetic radiation model can be build based on Hamming distance [7], [8], as in (2). C = a* H( D ⊕ R) + b (2) In (2), C is the electromagnetic radiation; D is the original data, R is the result data; H is Hamming weight; ⊕ is operator XOR. Then H(D ⊕ R)is the Hamming distance of D and R. Let a = 1 and b = 0, then C is expressed simply as in (3).
  • 4.  ISSN: 2302-4046 TELKOMNIKA Vol. 12, No. 1, January 2014: 269 – 274 272 C = H(D ⊕ R) (3) The formula represents a series of changes in the relationship "Hamming distance of data→power consumption→electromagnetic radiation". Based on the analysis above, the power consumption is different while the information equipments process the data of "0" or "1", leading to changes in intensity of electromagnetic radiation and in electromagnetic signal. In particular, a bit of data transitions from "0" to "1" or vice-versa results in a short current pulse from Vdd to Vss, then electromagnetic information leakage can be captured through the method of DPA (Differential Power Analysis) [5]-[8] or EA (Electromagnetic Analysis) [7] etc. If reducing the Hamming distance of the sensitive data or keeping Hamming distance constant, it will reduce the variation of electromagnetic wave radiated or keep the changes of electromagnetic signal constant, then the interception is more difficult. So intercepting the electromagnetic wave with information becomes more hardly. 4. Adjusting the Hamming Distance to Anti-Intercept Touch screen monitors are widely used as an input device in an automatic teller machine (ATM), a cash dispenser (CD), a door and gate access control terminal, mobile [9], and so on. In the operation, the operator inputs often the certificate code by touching the numeric and character button image. The touched button image then changes the color at one time to inform the operator the input button key. The change of color of the touched button image is widely general in the flow of input button key operations on touch screen monitors. The standard color scheme of the touch screen monitors is showed as Figure 4. Figure 4. Standard color scheme of a touch screen monitor The image that touch screen monitors display can be reconstructed on a personal computer with intercepting electromagnetic radiation [10]-[12]. If the change of color of the touched button image can be distinguished in the reconstructed display image, the information of input button key operations on touch screen monitors leaks from the electromagnetic radiation [13]. The color change means that the data changes, it means the Hamming distance of data is not 0 before and after touch the numeric button. There are changes in electromagnetic radiation. Table 1 shows a touch screen standard color scheme and data encoding. The calculations for the standard color scheme are summarized in Table 2 before and after touch the numeric button.
  • 5. TELKOMNIKA ISSN: 2302-4046  Analysis of the Relationship between Hamming Distance and ... (Zhang Jiemin) 273 Table 1. Standard color scheme and data encoding Numeric button No touched Touched background color black [00H : 00H : 00H] black [00H : 00H : 00H] image color green [00H: FFH : 00H] magenta [FFH : 00H : FFH] digit color white [FFH : FFH: FFH] white [FFH : FFH: FFH] Table 2. Hamming distance for standard color scheme before and after touch the numeric button Numeric button No touched Touched color change of image [00H: 00H : 00H] →[00H :FFH : 00H] [00H :00H :00H] →[FFH :00H :FFH] Hamming distance for image 8 16 color change of digit edge [00H :FFH :00H] → [FFH :FFH:FFH] [FFH :00H :FFH]→ [FFH :FFH:FFH] Hamming distance for digit edge 16 8 The reason for the information leak of input button key operations on touch screen monitors is investigated in Table 2. Select cyan color ([00H : FFH : FFH]) as a different image color for touch button, called anti-intercept color scheme showed as Figure 5, so that the Hamming distance of data is 0 before and after touch the numeric button. Figure 5. Anti-intercept color scheme of a touch screen monitor The calculations for the anti-intercept color scheme are summarized in Table 3 before and after touch the numeric button. Table 3. Hamming distance for anti-intercept color scheme before and after touch the numeric button Numeric button No touched Touched color change of image [00H : 00H : 00H] →[00H : FFH : FFH] [00H:00H :00H] →[FFH :00H :FFH] Hamming distance for image 16 16 color change of digit edge [00H : FFH : FFH] → [FFH :FFH:FFH] [FFH:00H :FFH]→ [FFH :FFH:FFH] Hamming distance for digit edge 8 8 Compare the anti-intercept color scheme with the standard color scheme, showed as Table 4, Either the Hamming distance for image or the Hamming distance for digit is constant before and after touch the numeric button for the anti-intercept color scheme, it is 16 or 8 respectively.
  • 6.  ISSN: 2302-4046 TELKOMNIKA Vol. 12, No. 1, January 2014: 269 – 274 274 Table 4. Hamming distance for anti-intercept color scheme and standard color scheme Numeric button Standard Image Standard Digit edge Anti-intercept Image Anti-intercept Digit edge no touched 8 16 16 8 touched 16 8 16 8 difference -8 8 0 0 5. Conclusion Because that the Hamming distance is constant, the electromagnetic radiation variation maintains constant before and after touch a numeric button. It result in that can't determine whether a numeric button is touched thereby protecting the password security. The anti- intercept color scheme used in practical application, it is really difficult to capture and reconstruct original data using electromagnetic radiation. So adjusting the Hamming distance of data to make the electromagnetic radiation variation is constant, can effectively prevent the electromagnetic information leakage, protect the confidential data security. Adjusting the Hamming distance of data to make the electromagnetic radiation variation is less, can effectively attenuate the electromagnetic information leakage, protect the confidential data from attack. References [1] Markus G Kuhn. Compromising emanations: eavesdropping risks of computer displays. University of Cambridge Computer Laboratory Technical Report. 2003; UCAM-CL-TR: 577-581. [2] Van Eck W. Electromagnetic radiation from video display units: An eavesdropping risk?. Computers and Security. 1985; 4(4): 269-286. [3] CHU Jie, DING Guoliang, DENG Gaoming, ZHAO Qiang. Design and Realization of Differential Power Analysis for DES, Department of Computer Engineering. Journal of Chinese Computer Systems. 2007; 1(28):11-14. [4] Timo Kasper, David Oswald, and Christof Paar. EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment. Horst Görtz Institute for IT Security Ruhr University Bochum, Germany, HY Youm and M Yung (Eds.): WISA 2009: LNCS 5932: 79-93. [5] DING Guoliang, CHANG Xiaolong, CHENG Jiawen, WU Cuixi. The Electromagnetic Information Leakage Evaluation on Basic CMOS Gate. Microelectronics & Computer. 2011; 28(5): 67-70. [6] ZHANG Jingjing, LI Renfa, LI Lang, ZENG Qingguang. Research and realization of simulation of DES differential power analysis attack. Computer Englneering and Applications. 2010; 46(33): 82-84. [7] Karine Gandol, Christophe Mourtel, and Francis Olivier. Electromagnetic Analysis: Concrete Results, Hardware and Embedded Systems. Computer Science. 2001; Lecture Notes (2162): 251-262. [8] LU Chang, PAN Xiong. Research on the selection function in diferential power analysis. Information Technology. 2012; 3: 108-110. [9] Emy Setyaningsih, Catur Iswahyudi. Image Encryption on Mobile Phone Using Super Encryption Algorithm. TELKOMNIKA Telecommunication Computing Electronics and Control. 2012; 10(4): 837- 845. [10] Hidenori Sekiguchi, Shinji Seto. Measurement of Radiated Computer RGB signals. Progress In Electromagnetics Research C. 2009; 7(C): 1-12. [11] Hidenori Sekiguchi, Shinji Seto. Measurement of Computer RGB signals in Conducted Emission on Power Leads. Progress In Electromagnetics Research. 2009; 7(C): 51-64. [12] Hidenori Sekiguchi. Information leakage of input operation on touch screen monitors caused by electromagnetic noise. IEEE 978-1-4244-6307-72010. [13] Deris Stiawan, Mohd Yazid Idris, Abdul Hanan Abdullah. Attack and Vulnerability Penetration Testing: FreeBSD. TELKOMNIKA Indonesian Journal of Electrical Engineering. 2013; 11(2): 399-408.