Attacking Misaligned Power Tracks Using Fourth-Order Cumulant

Abstract

Side channel attacks (SCA) use the leaked confidential data to reveal the cipher key. Power consumptions, electromagnetic emissions, and operation timing of cryptographic hardware are examples of measurable parameters (analysis) effected by internal confident data. To prevent such attacks, SCA countermeasures are implemented. Misaligned power tracks is a considerable countermeasure which directly affect the effectiveness of SCA. Added to that, SCA are suffering from tremendous types of noise problems. This paper proposes Fourth-order Cumulant Analysis as preprocessing step to align power tracks dynamically and partially. Moreover, this paper illustrates that the proposed analysis can efficiently deal with Gaussian noise and misaligned tracks through comprehensive analysis of an AES 128 bit block cipher.

Authors and Affiliations

Eng. M. Shiple, Prof. Dr. Iman Ashour, Prof. Dr. Abdelhady Ammar

Keywords

Related Articles

Retrieval of Images Using DCT and DCT Wavelet Over Image Blocks 

This paper introduces a new CBIR system based on two different approaches in order to achieve the retrieval efficiency and accuracy. Color and texture information is extracted and used in this work to form the feature ve...

A Fuzzy Similarity Based Concept Mining Model for Text Classification

Text Classification is a challenging and a red hot field in the current scenario and has great importance in text categorization applications. A lot of research work has been done in this field but there is a need to cat...

Sperm Motility Algorithm for Solving Fractional Programming Problems under Uncertainty

This paper investigated solving Fractional Programming Problems under Uncertainty (FPPU) using Sperm Motility Algorithm. Sperm Motility Algorithm (SMA) is a novel metaheuristic algorithm inspired by fertilization process...

Performance Comparison of Protocols Combination based on EIGRP and OSPF for Real-Time Applications in Enterprise Networks

This work studies the impact of redistribution on network performance compared with the use of a single routing protocol. A real network with real traffic parameters is simulated, in order to investigate a real deploymen...

Student Facial Authentication Model based on OpenCV’s Object Detection Method and QR Code for Zambian Higher Institutions of Learning

Facial biometrics captures human facial physiological data, converts it into a data item variable so that this stored variable may be used to provide information security services, such as authentication, integrity manag...

Download PDF file
  • EP ID EP152152
  • DOI 10.14569/IJACSA.2013.041202
  • Views 105
  • Downloads 0

How To Cite

Eng. M. Shiple, Prof. Dr. Iman Ashour, Prof. Dr. Abdelhady Ammar (2013). Attacking Misaligned Power Tracks Using Fourth-Order Cumulant. International Journal of Advanced Computer Science & Applications, 4(12), 8-14. https://europub.co.uk/articles/-A-152152