Attacking Misaligned Power Tracks Using Fourth-Order Cumulant
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 12
Abstract
Side channel attacks (SCA) use the leaked confidential data to reveal the cipher key. Power consumptions, electromagnetic emissions, and operation timing of cryptographic hardware are examples of measurable parameters (analysis) effected by internal confident data. To prevent such attacks, SCA countermeasures are implemented. Misaligned power tracks is a considerable countermeasure which directly affect the effectiveness of SCA. Added to that, SCA are suffering from tremendous types of noise problems. This paper proposes Fourth-order Cumulant Analysis as preprocessing step to align power tracks dynamically and partially. Moreover, this paper illustrates that the proposed analysis can efficiently deal with Gaussian noise and misaligned tracks through comprehensive analysis of an AES 128 bit block cipher.
Authors and Affiliations
Eng. M. Shiple, Prof. Dr. Iman Ashour, Prof. Dr. Abdelhady Ammar
Validating Antecedents of Customer Engagement in Social Networking Sites using Fuzzy Delphi Analysis
The concept of online customer engagement is getting imperative in modern business due to the uncontrolled conversation via cyber-avenue. This study validates the antecedents of customer engagement conceptualized in Soci...
Electromyography Signal Acquisition and Analysis System for Finger Movement Classification
Electromyography (EMG) is very important to capture muscle activity. Although many jobs establish data acquisition system, however, it is also essential to demonstrate that these data are reliable. In this sense, one pro...
Combating the Looping Behavior: A Result of Routing Layer Attack
Routing layer is one of the most important layers of the network stack. In wireless ad hoc networks, it becomes more significant because nodes act as relay nodes or routers in the network. This characteristic puts them a...
School Manager System based on a Personal Information Architecture
The current technological revolution has provided multiple benefits to human activities. For their part, organizations have had the need to make changes to their business requirements, which have led them to migrate to s...
An Auction-Bidding Protocol for Distributed Bit Allocation in RSSI-based Localization Networks
Several factors (e.g., target energy, sensor density) affect estimation error at a point of interest in sensor networks. One of these factors is the number of allocated bits to sensors that cover the point of interest wh...