Title
Improved Power Analysis Attack Based On The Preprocessed Power Traces
Abstract
In recent years, side-channel attacks have become a most powerful attack performed on cryptographic devices. And many side-channel attack methods have sprung up, such as time attacks, electromagnetic radiation attacks, power analysis attacks including simple power attack, differential power attack, correlation power attack, etc. And the correlation power attack has become the most common side-channel attack. In this paper, we introduce a method to improve the correlation power attack (CPA). Our method is mainly to preprocess the recorded power consumption of a cryptographic device. During the procedure, we introduce a four-dimension vector to express the basic unit which we deal with. And also we give the steps of performing our improved CPA (named as ICPA). Then the experiment shows that the ICPA method enhances the efficiency. Meanwhile, we briefly show that preprocessing power traces increases the signal-to-noise ratio (SNR) comparing with non-preprocessed power traces.
Year
DOI
Venue
2016
10.1007/978-3-319-39077-2_18
GREEN, PERVASIVE, AND CLOUD COMPUTING
Keywords
Field
DocType
Side-channel attack, Correlation power attack, ICPA, Power model, SNR
Power analysis,Cryptography,Computer security,Computer science,Computer network,Power model,Preprocessor,Side channel attack,Computer engineering,Power consumption,Power attack
Conference
Volume
ISSN
Citations 
9663
0302-9743
0
PageRank 
References 
Authors
0.34
3
4
Name
Order
Citations
PageRank
Xueyang Han100.34
Qiuliang Xu215742.71
Fengbo Lin300.68
Minghao Zhao4122.50