Browse > Article
http://dx.doi.org/10.13089/JKIISC.2010.20.4.109

A Pre-processing Technique for Performance Enhancement of the Differential Power Analysis Attack  

Lee, You-Seok (Electronics and Telecommunications Research Institute)
Lee, Yu-Ri (Pusan National University)
Lee, Young-Jun (Pusan National University)
Kim, Hyoung-Nam (Pusan National University)
Abstract
Differential Power Analysis (DPA) is well known as one of efficient physical side-channel attack methods using leakage power consumption traces. However, since the power traces usually include the components irrelevant to the encryption, the efficiency of the DPA attack may be degraded. To enhance the performance of DPA, we introduce a pre-processing technique which extracts the encryption-related parts from the measured power consumption signals. Experimental results show that the DPA attack with the use of the proposed pre-processing method detects correct cipher keys with much smaller number of signals compared to that of the conventional DPA attack.
Keywords
Side channel attack; Differential power analysis; pre-processing technique;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 K. Gandolfi, C. Mourtel, and F. Oliver, Electromagnetic Attacks: Concrete Results, in Proceedings of CHES 2001.
2 S. Mangard, E. Oswald, and T.Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, Springer Science + Business Media, LLC., 2007.
3 P. Kocher, J. Jaffe, and B. Jun, "Introduction to Differential Power Analysis and Related attacks," White Paper, Cryptography Research, http://www.cryptography.com/dpa/technical, 1998.
4 류정춘, 한동국, 김성경, 김희석, 김태현, 이상진, "웨이블릿 기반의 차분전력분석 기법 제안", 정보보호학회논문지, 19(3), pp.27-34, 2009년 6월.   과학기술학회마을
5 Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197, 2001.
6 J.J. Quisquater and D. Samyde, Electromagnetic Analysis (EMA): Measures and Countermeasures for Smart Cards, in Proceedings of e-Smart 2001.
7 P. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA. DSS. and Other Systems," Advances in Cryptology-Crypto, 1996, LNCS 1109, pp. 104-113, 1996.
8 P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," CRYPTO 1999, LNCS 1666, pp. 388-397, 1999.
9 E. Brier, C. Clavier, and F. Olivier, "Correlation power analysis with a leakage model," CHES 2004, LNCS 3156, pp. 16-29, 2004.
10 T.H. Le, J. Clediere, C. Serviere, and J.L. Lacoume, "Noise Re-duction in Side channel Attack Using Fourth-Order Cumulant," IEEE Transactions on Information Forensics and Security, vol. 2, no. 4, pp. 710-720, Dec. 2007.   DOI