Power model in power analysis attack

A mapping relation model should be established between data value and power value which is collected from device under attack when the power analysis attack accuse.The sensitive information can be fund through the power trace analysis using this type of relation.Hamming distance model and hamming we...

Full description

Saved in:
Bibliographic Details
Main Authors: Peng LUO, Deng-guo FENG, Yong-bin ZHOU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2012-09-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.037/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539887114747904
author Peng LUO
Deng-guo FENG
Yong-bin ZHOU
author_facet Peng LUO
Deng-guo FENG
Yong-bin ZHOU
author_sort Peng LUO
collection DOAJ
description A mapping relation model should be established between data value and power value which is collected from device under attack when the power analysis attack accuse.The sensitive information can be fund through the power trace analysis using this type of relation.Hamming distance model and hamming weight model were described based on device’s physical characteristics.Furthermore,the correctness of hamming weight model was proved not only by Formula Derivation,but also by experiment under power consumption collection platform based on MCU.The experimental results show that hamming weight model is a valid and practicable model in power analysis attack.
format Article
id doaj-art-f7e077e4ca514868be0a4a40a8017043
institution Kabale University
issn 1000-436X
language zho
publishDate 2012-09-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-f7e077e4ca514868be0a4a40a80170432025-01-14T06:34:02ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2012-09-013327628159667984Power model in power analysis attackPeng LUODeng-guo FENGYong-bin ZHOUA mapping relation model should be established between data value and power value which is collected from device under attack when the power analysis attack accuse.The sensitive information can be fund through the power trace analysis using this type of relation.Hamming distance model and hamming weight model were described based on device’s physical characteristics.Furthermore,the correctness of hamming weight model was proved not only by Formula Derivation,but also by experiment under power consumption collection platform based on MCU.The experimental results show that hamming weight model is a valid and practicable model in power analysis attack.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.037/information securitycryptographyside channel attackpower analysis attackpower model
spellingShingle Peng LUO
Deng-guo FENG
Yong-bin ZHOU
Power model in power analysis attack
Tongxin xuebao
information security
cryptography
side channel attack
power analysis attack
power model
title Power model in power analysis attack
title_full Power model in power analysis attack
title_fullStr Power model in power analysis attack
title_full_unstemmed Power model in power analysis attack
title_short Power model in power analysis attack
title_sort power model in power analysis attack
topic information security
cryptography
side channel attack
power analysis attack
power model
url http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.037/
work_keys_str_mv AT pengluo powermodelinpoweranalysisattack
AT dengguofeng powermodelinpoweranalysisattack
AT yongbinzhou powermodelinpoweranalysisattack