Attacking Misaligned Power Tracks Using Fourth-Order Cumulant
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 12
Abstract
Side channel attacks (SCA) use the leaked confidential data to reveal the cipher key. Power consumptions, electromagnetic emissions, and operation timing of cryptographic hardware are examples of measurable parameters (analysis) effected by internal confident data. To prevent such attacks, SCA countermeasures are implemented. Misaligned power tracks is a considerable countermeasure which directly affect the effectiveness of SCA. Added to that, SCA are suffering from tremendous types of noise problems. This paper proposes Fourth-order Cumulant Analysis as preprocessing step to align power tracks dynamically and partially. Moreover, this paper illustrates that the proposed analysis can efficiently deal with Gaussian noise and misaligned tracks through comprehensive analysis of an AES 128 bit block cipher.
Authors and Affiliations
Eng. M. Shiple, Prof. Dr. Iman Ashour, Prof. Dr. Abdelhady Ammar
Outcome based Assessment using Fuzzy Logic
Outcome Based Education (OBE) or student centered learning is one of the key component in quality assurance and enhancement in the higher education. The OBE approach encourages students to become active learner rather th...
Scalable Scientific Workflows Management System SWFMS
In today’s electronic world conducting scientific experiments, especially in natural sciences domain, has become more and more challenging for domain scientists since “science” today has turned out to be more complex due...
Creating a Knowledge Database for Lectures of Faculty Members, Proposed E-Module for Isra University
Higher education in Jordan is currently expanding as new universities open and compete for offering the best learning experience. Many universities face accreditation challenges, hence, they attend to recruit lecturers w...
Enhancement of KaPoW Plugin to Defend Against DDoS Attacks
DDoS attack is one of the hardest attacks to detect and mitigate in the computer world. This paper introduces two quantitative models, which use the client puzzling to detect and thwart application DDoS attacks. We simul...
A new Hierarchical Group Key Management based on Clustering Scheme for Mobile Ad Hoc Networks
The migration from wired network to wireless network has been a global trend in the past few decades because they provide anytime-anywhere networking services. The wireless networks are rapidly deployed in the future, se...