Browse > Article
http://dx.doi.org/10.13089/JKIISC.2014.24.6.1055

The Enhanced Power Analysis Using Linear Discriminant Analysis  

Kang, Ji-Su (Samsung Electronics Co., Ltd.)
Kim, HeeSeok (Korea Institute of Science and Technology Information)
Hong, Seokhie (Korea University)
Abstract
Recently, various methods have been proposed for improving the performance of the side channel analysis using the power consumption. Of those method, waveform compression method applies to reduce the noise component in pre-processing step. In this paper, we propose the new LDA(Linear Discriminant Analysis)-based signal compression method finding unique feature vector. Through experimentations, we are comparing the proposed method with the PCA(Principal Component Analysis)-based method which has known for the best performance among existing signal compression methods.
Keywords
Side-Channel Analysis; Power Analysis; Linear Discriminant Analysis;
Citations & Related Records
연도 인용수 순위
  • Reference
1 P. C. Kocher, J. Jae, and B. Jun., "Timing Attacks on Implementations of Die-Hellman, RSA, DSS, and Other Systems," CRYPTO 1996, LNCS 1109, pp. 104-113, Springer-Verlag, 1996.
2 P. Kocher, J. Jaffe, B. Jun, "Differential power analysis," CRYPTO 1999, LNCS 1666, pp. 388-397, Springer-Verlag, 1999.
3 E. Brier, C. Clavier, F. Olivier, "Correlation power analysis with a leakage model," CHES 2004, LNCS 3156, pp. 16-29, 2004.
4 D. Agrawal, B. Archambeault, J. R. Rao, and P. Rohatgi., "The EM Side-Channel(s)," CHES 2002, LNCS 2524, pp. 29-45, 2003.
5 A. Moradi, MTM. Shalmani, M. Salmasizadeh, "A Generalized Method of Differential Fault Attack Against AES Cryptosystem," CHES 2006, LNCS 4249, pp. 91-100, 2006.
6 S. Mangard, E. Oswald, and T. Popp, "Power Analysis Attacks: Revealing the secrets of smart cards," pp, 82-86, Springer, 2007.
7 PN Belhumeur, JP Hespanha, DJ Kriegman, "Eigenfaces vs. Fisherfaces: Recognition using class specific linear projection," IEEE Transactions on pattern analysis and machine intelligence, VOL 19, No. 7, 1997.
8 O. Choudary, M. G. Kuhn, "Efficient Tmeplate Attacks," CARDIS 2013, LNCS 8419, pp. 253-270, 2014.
9 Y. Souissi, M. Nassar, S. Guilley, J. Danger, F. Flament, "First Principal Components Analysis: A New Side Channel Distinguisher," ICISC 2010, LNCS 6829, pp. 407-419, 2011.
10 S. Mangard, E. Oswald, and T. Popp, "Power Analysis Attacks: Revealing the secrets of smart cards," pp, 73-79, Springer, 2007.
11 L. Batina, J. Hogenboom, Jasper G.J. van Woudenberg, "Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis," CT-RSA 2012, LNCS 7178, pp.383-397, 2012.
12 Y. Kim, H. Ko, "Using Principal Component Analysis for Practical Biasing of Power Traces to Improve Power Analysis Attacks,"ICISC 2013, 2013.
13 E. Oswald and P. Rohatgi, "Using Subsapce-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages," CHES 2008, LNCS 5154, pp. 411-425, 2008.