Abstract

Data encryption is critical for information security. Previous studies show that power analysis is a powerful tool for side-channel attack (SCA) against cryptographic modules. Therefore, it is essential to carry out power analysis to assess the vulnerability of cryptographic modules. The success of power analysis relies on aligned power traces, which is not easy without an external trigger point. In this paper, we propose an automatic power trace alignment method so that operations in power traces and be located without external trigger points. Experimental results show that the proposed method can be applied to various ciphers, including AES and RSA.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.