Attacking Misaligned Power Tracks Using Fourth-Order Cumulant

Abstract

Side channel attacks (SCA) use the leaked confidential data to reveal the cipher key. Power consumptions, electromagnetic emissions, and operation timing of cryptographic hardware are examples of measurable parameters (analysis) effected by internal confident data. To prevent such attacks, SCA countermeasures are implemented. Misaligned power tracks is a considerable countermeasure which directly affect the effectiveness of SCA. Added to that, SCA are suffering from tremendous types of noise problems. This paper proposes Fourth-order Cumulant Analysis as preprocessing step to align power tracks dynamically and partially. Moreover, this paper illustrates that the proposed analysis can efficiently deal with Gaussian noise and misaligned tracks through comprehensive analysis of an AES 128 bit block cipher.

Authors and Affiliations

Eng. M. Shiple, Prof. Dr. Iman Ashour, Prof. Dr. Abdelhady Ammar

Keywords

Related Articles

Outcome based Assessment using Fuzzy Logic

Outcome Based Education (OBE) or student centered learning is one of the key component in quality assurance and enhancement in the higher education. The OBE approach encourages students to become active learner rather th...

Scalable Scientific Workflows Management System SWFMS

In today’s electronic world conducting scientific experiments, especially in natural sciences domain, has become more and more challenging for domain scientists since “science” today has turned out to be more complex due...

Creating a Knowledge Database for Lectures of Faculty Members, Proposed E-Module for Isra University

Higher education in Jordan is currently expanding as new universities open and compete for offering the best learning experience. Many universities face accreditation challenges, hence, they attend to recruit lecturers w...

Enhancement of KaPoW Plugin to Defend Against DDoS Attacks

DDoS attack is one of the hardest attacks to detect and mitigate in the computer world. This paper introduces two quantitative models, which use the client puzzling to detect and thwart application DDoS attacks. We simul...

A new Hierarchical Group Key Management based on Clustering Scheme for Mobile Ad Hoc Networks

The migration from wired network to wireless network has been a global trend in the past few decades because they provide anytime-anywhere networking services. The wireless networks are rapidly deployed in the future, se...

Download PDF file
  • EP ID EP152152
  • DOI 10.14569/IJACSA.2013.041202
  • Views 103
  • Downloads 0

How To Cite

Eng. M. Shiple, Prof. Dr. Iman Ashour, Prof. Dr. Abdelhady Ammar (2013). Attacking Misaligned Power Tracks Using Fourth-Order Cumulant. International Journal of Advanced Computer Science & Applications, 4(12), 8-14. https://europub.co.uk/articles/-A-152152