Power Analysis on Embedded Cryptography by