标题:Improved Power Analysis Attack Based on the Preprocessed Power Traces
作者:Han, Xueyang; Xu, Qiuliang; Lin, Fengbo; Zhao, Minghao
通讯作者:Xu, Qiuliang
作者机构:[Han, Xueyang; Xu, Qiuliang; Lin, Fengbo; Zhao, Minghao] Shandong Univ, Sch Comp Sci & Technol, Jinan, Peoples R China.
会议名称:11th International Conference on Green, Pervasive and Cloud Computing (GPC)
会议日期:MAY 06-08, 2016
来源:GREEN, PERVASIVE, AND CLOUD COMPUTING
出版年:2016
卷:9663
页码:278-289
DOI:10.1007/978-3-319-39077-2_18
关键词:Side-channel attack; Correlation power attack; ICPA; Power model; SNR
摘要:In recent years, side-channel attacks have become a most powerful attack performed on cryptographic devices. And many side-channel attack methods have sprung up, such as time attacks, electromagnetic radiation attacks, power analysis attacks including simple power attack, differential power attack, correlation power attack, etc. And the correlation power attack has become the most common side-channel attack. In this paper, we introduce a method to improve the correlation power attack (CPA). Our method is mainly to preprocess the recorded power consumption of a cryptographic device. During the procedure, we introduce a four-dimension vector to express the basic unit which we deal with. And also we give the steps of performing our improved CPA (named as ICPA). Then the experiment shows that the ICPA method enhances the efficiency. Meanwhile, we briefly show that preprocessing power traces increases the signal-to-noise ratio (SNR) comparing with non-preprocessed power traces.
收录类别:CPCI-S;EI;SCOPUS
资源类型:会议论文;期刊论文
原文链接:https://www.scopus.com/inward/record.uri?eid=2-s2.0-84969256220&doi=10.1007%2f978-3-319-39077-2_18&partnerID=40&md5=722fdd56a058549145fd1d1dbf1d9fed
TOP