Attacking Misaligned Power Tracks Using Fourth-Order Cumulant

Abstract

Side channel attacks (SCA) use the leaked confidential data to reveal the cipher key. Power consumptions, electromagnetic emissions, and operation timing of cryptographic hardware are examples of measurable parameters (analysis) effected by internal confident data. To prevent such attacks, SCA countermeasures are implemented. Misaligned power tracks is a considerable countermeasure which directly affect the effectiveness of SCA. Added to that, SCA are suffering from tremendous types of noise problems. This paper proposes Fourth-order Cumulant Analysis as preprocessing step to align power tracks dynamically and partially. Moreover, this paper illustrates that the proposed analysis can efficiently deal with Gaussian noise and misaligned tracks through comprehensive analysis of an AES 128 bit block cipher.

Authors and Affiliations

Eng. M. Shiple, Prof. Dr. Iman Ashour, Prof. Dr. Abdelhady Ammar

Keywords

Related Articles

Validating Antecedents of Customer Engagement in Social Networking Sites using Fuzzy Delphi Analysis

The concept of online customer engagement is getting imperative in modern business due to the uncontrolled conversation via cyber-avenue. This study validates the antecedents of customer engagement conceptualized in Soci...

Electromyography Signal Acquisition and Analysis System for Finger Movement Classification

Electromyography (EMG) is very important to capture muscle activity. Although many jobs establish data acquisition system, however, it is also essential to demonstrate that these data are reliable. In this sense, one pro...

Combating the Looping Behavior: A Result of Routing Layer Attack

Routing layer is one of the most important layers of the network stack. In wireless ad hoc networks, it becomes more significant because nodes act as relay nodes or routers in the network. This characteristic puts them a...

School Manager System based on a Personal Information Architecture

The current technological revolution has provided multiple benefits to human activities. For their part, organizations have had the need to make changes to their business requirements, which have led them to migrate to s...

An Auction-Bidding Protocol for Distributed Bit Allocation in RSSI-based Localization Networks

Several factors (e.g., target energy, sensor density) affect estimation error at a point of interest in sensor networks. One of these factors is the number of allocated bits to sensors that cover the point of interest wh...

Download PDF file
  • EP ID EP152152
  • DOI 10.14569/IJACSA.2013.041202
  • Views 86
  • Downloads 0

How To Cite

Eng. M. Shiple, Prof. Dr. Iman Ashour, Prof. Dr. Abdelhady Ammar (2013). Attacking Misaligned Power Tracks Using Fourth-Order Cumulant. International Journal of Advanced Computer Science & Applications, 4(12), 8-14. https://europub.co.uk/articles/-A-152152