Abstract | ||
---|---|---|
In recent years, side-channel attacks have become a most powerful attack performed on cryptographic devices. And many side-channel attack methods have sprung up, such as time attacks, electromagnetic radiation attacks, power analysis attacks including simple power attack, differential power attack, correlation power attack, etc. And the correlation power attack has become the most common side-channel attack. In this paper, we introduce a method to improve the correlation power attack (CPA). Our method is mainly to preprocess the recorded power consumption of a cryptographic device. During the procedure, we introduce a four-dimension vector to express the basic unit which we deal with. And also we give the steps of performing our improved CPA (named as ICPA). Then the experiment shows that the ICPA method enhances the efficiency. Meanwhile, we briefly show that preprocessing power traces increases the signal-to-noise ratio (SNR) comparing with non-preprocessed power traces. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1007/978-3-319-39077-2_18 | GREEN, PERVASIVE, AND CLOUD COMPUTING |
Keywords | Field | DocType |
Side-channel attack, Correlation power attack, ICPA, Power model, SNR | Power analysis,Cryptography,Computer security,Computer science,Computer network,Power model,Preprocessor,Side channel attack,Computer engineering,Power consumption,Power attack | Conference |
Volume | ISSN | Citations |
9663 | 0302-9743 | 0 |
PageRank | References | Authors |
0.34 | 3 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Xueyang Han | 1 | 0 | 0.34 |
Qiuliang Xu | 2 | 157 | 42.71 |
Fengbo Lin | 3 | 0 | 0.68 |
Minghao Zhao | 4 | 12 | 2.50 |