Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals
スポンサーリンク
概要
- 論文の詳細を見る
A power analysis attack is a well-known side-channel attack but the efficiency of the attack is frequently degraded by the existence of power components, irrelative to the encryption included in signals used for the attack. To enhance the performance of the power analysis attack, we propose a preprocessing method based on extracting encryption-related parts from the measured power signals. Experimental results show that the attacks with the preprocessed signals detect correct keys with much fewer signals, compared to the conventional power analysis attacks.
著者
-
Han Dong-guk
Dept. Of Mathematics Kookmin University
-
KIM Hyoung-Nam
Pusan National University
-
KIM Ho-Won
Pusan National University
-
LEE Young-Jun
Pusan National University
-
LEE You-Seok
Broadcasting System Research Department, Electronics and Telecommunications Research Institute
関連論文
- Countermeasures against Power Analysis Attacks for the NTRU Public Key Cryptosystem
- TinyECCK16 : An Efficient Field Multiplication Algorithm on 16-bit Environment and Its Application to Tmote Sky Sensor Motes
- Acceleration of Differential Power Analysis through the Parallel Use of GPU and CPU
- Efficient Implementation of Pairing-Based Cryptography on a Sensor Node
- Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals
- Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals