Abstract

Side channel attacks (SCA) use the leaked confidential data to reveal the cipher key. Power consumptions, electromagnetic emissions, and operation timing of cryptographic hardware are examples of measurable parameters (analysis) effected by internal confident data. To prevent such attacks, SCA countermeasures are implemented. Misaligned power tracks is a considerable countermeasure which directly affect the effectiveness of SCA. Added to that, SCA are suffering from tremendous types of noise problems. This paper proposes Fourth-order Cumulant Analysis as preprocessing step to align power tracks dynamically and partially. Moreover, this paper illustrates that the proposed analysis can efficiently deal with Gaussian noise and misaligned tracks through comprehensive analysis of an AES 128 bit block cipher.

Highlights

  • In the past decade, new threats become more and more efficient and powerful against cryptosystems

  • Paul Kocher et al introduced a powerful cryptanalysis technique called Differential power analysis (DPA) in 1999 [8]. This technique is based on the dependency of the processed data/the operation performed to power consumption of the device under attack (DUA)

  • High-Order Differential Power Analysis (HO-DPA) enables multiple data sources and different time offsets to be incorporated in the analysis

Read more

Summary

INTRODUCTION

New threats become more and more efficient and powerful against cryptosystems. Ultraviolet ray is used to unauthorized access to the stored data the cryptosystem designers use many of anti-fuse to prevent such attacks like Security Fuse, Program Fuse, Array Fuses, and oProbe Fuse [3]. Another technique; a transient fault during the execution of some process is injected. Paul Kocher et al introduced a powerful cryptanalysis technique called Differential power analysis (DPA) in 1999 [8] This technique is based on the dependency of the processed data/the operation performed to power consumption of the device under attack (DUA). We conclude with the main advantages presented in this paper

PASSIVE NONINVASIVE ATTACK
ALIGNMENT TECHNIQUES
Dynamic Time Warping
Fine Tuned Extraction
FOURTH ORDER CUMULANT
PROPOSED PREPROCESSING TECHNIQUE
CONCLUSION
Findings
VIII. FUTURE WORK
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.