Power model in power analysis attack
A mapping relation model should be established between data value and power value which is collected from device under attack when the power analysis attack accuse.The sensitive information can be fund through the power trace analysis using this type of relation.Hamming distance model and hamming we...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2012-09-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.037/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539887114747904 |
---|---|
author | Peng LUO Deng-guo FENG Yong-bin ZHOU |
author_facet | Peng LUO Deng-guo FENG Yong-bin ZHOU |
author_sort | Peng LUO |
collection | DOAJ |
description | A mapping relation model should be established between data value and power value which is collected from device under attack when the power analysis attack accuse.The sensitive information can be fund through the power trace analysis using this type of relation.Hamming distance model and hamming weight model were described based on device’s physical characteristics.Furthermore,the correctness of hamming weight model was proved not only by Formula Derivation,but also by experiment under power consumption collection platform based on MCU.The experimental results show that hamming weight model is a valid and practicable model in power analysis attack. |
format | Article |
id | doaj-art-f7e077e4ca514868be0a4a40a8017043 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2012-09-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-f7e077e4ca514868be0a4a40a80170432025-01-14T06:34:02ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2012-09-013327628159667984Power model in power analysis attackPeng LUODeng-guo FENGYong-bin ZHOUA mapping relation model should be established between data value and power value which is collected from device under attack when the power analysis attack accuse.The sensitive information can be fund through the power trace analysis using this type of relation.Hamming distance model and hamming weight model were described based on device’s physical characteristics.Furthermore,the correctness of hamming weight model was proved not only by Formula Derivation,but also by experiment under power consumption collection platform based on MCU.The experimental results show that hamming weight model is a valid and practicable model in power analysis attack.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.037/information securitycryptographyside channel attackpower analysis attackpower model |
spellingShingle | Peng LUO Deng-guo FENG Yong-bin ZHOU Power model in power analysis attack Tongxin xuebao information security cryptography side channel attack power analysis attack power model |
title | Power model in power analysis attack |
title_full | Power model in power analysis attack |
title_fullStr | Power model in power analysis attack |
title_full_unstemmed | Power model in power analysis attack |
title_short | Power model in power analysis attack |
title_sort | power model in power analysis attack |
topic | information security cryptography side channel attack power analysis attack power model |
url | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.037/ |
work_keys_str_mv | AT pengluo powermodelinpoweranalysisattack AT dengguofeng powermodelinpoweranalysisattack AT yongbinzhou powermodelinpoweranalysisattack |