Overview We demonstrated physical side-channel attacks on a popular software implementation of RSA and ElGamal, running on laptop computers. Our attacks use novel side channels and are based on the observation that the "ground" electric potential in many computers fluctuates in a computation-dependent way. An attacker can measure this signal by touching exposed metal on the computer's chassis with a plain wire, or even with a bare hand. Through suitable cryptanalysis and signal processing, we have extracted bit RSA keys and bit ElGamal keys from laptops, via each of these channels, as well as via power analysis and electromagnetic probing.
Submit your manuscript for consideration via email to JPS.
Papers should focus on physical security. Both technical and social science aspects are of interest. Papers primarily about cyber security, cryptography, criminology, or law enforcement will not be accepted. Authors are welcome to contact the Editor to discuss possible papers at the above email address, or by using the contact form below.
Authors retain any copyright. Your manuscript should ideally be in. Cambria font size 12 and 1. References can be in any reasonable format that allows readers to find them. A section at the end of the paper with "References" or "References and Notes" is strongly preferred over Footnotes or Endnotes.
Please do not insert any text in the headers or borders, except page numbers. Research papers will typically be reviewed by 2 anonymous reviewers. Viewpoint papers can be reviewed by 0, 1, or 2 reviewers, depending on the content.
Authors should have their manuscript reviewed prior to submitting it to JPS to be sure it contains no sensitive or classified information that would be inappropriate to release to the public. By submitting a manuscript, authors are certifying that they are using no copyrighted material, or have explicit permission to use the copyrighted material, or its use clearly falls within "fair use" doctrine.
Technical or scholarly writing is NOT synonymous with bad writing. Good writing involves telling a story that flows in a logical and satisfying manner from beginning to end.
The best writing approximates speech. Short sentences are usually better than long sentences.
Less is often more. Avoid the passive voice, and be sure to write in the first person. Thus, "I analyzed the data. If you are not a good writer, find somebody who is to edit your manuscript prior to submitting it to JPS.
Authors for whom English is not their first language and lack proficiency should seek editing assistance from somebody who is fluent in English. JPS uses American spellings, e.
Simple graphs are often a useful way to convey data or findings, or to summarize tables. Figures can be in color. Long figure captions that explain what is going on in the figure are welcome.
Figure captions should be at the bottom of the figure and have the following format: Sometimes details or tangential issues are most effectively handled in an Appendix if they get in the way of the discussion. We rely on--and are very grateful to--anonymous reviewers who volunteer their time to review manuscripts submitted to JPS.As Start with Security suggests, securing paper, physical media, and devices is an important part of that strategy.
Securely store sensitive files. If your company has already committed to starting with security, you understand the importance of collecting sensitive information only if you have a legitimate business need and keeping it safe.
9 X 12 SELF Seal Security Catalog Envelopes- Designed for Secure Mailing- Securely Holds up to 60 Sheets of Paper with Strong Peel and Seal Flap ( Envelopes).
Type or paste a DOI name into the text box. Click Go. Your browser will take you to a Web page (URL) associated with that DOI name. Send questions or comments to doi.
Founded in , ASIS International is the world's largest membership organization for security management professionals. With hundreds of chapters across the globe, ASIS is recognized as the premier source for learning, board-certification, networking, standards, and research.
Physical security is a vital part of any security plan and is fundamental to all security efforts--without it, information security, software security, user access security, and network security are considerably more difficult, if not impossible, to initiate.
Reviewers are asked to advise whether the manuscript is appropriate for publication in JPS, and whether it represents a significant contribution to the field of physical security. Reviewers are also asked to offer suggestions for improving the work and the paper.