By Topic

A nobel key-search method for side channel attacks based on pattern recognition

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
You-Seok Lee ; Dept. of Electron. & Electr. Eng., Pusan Nat. Univ., Busan ; YongJe Choi ; Dong-Guk Han ; Ho Won Kim
more authors

Differential power analysis (DPA) has been known as an efficient attack for finding secret keys of cryptosystems but its efficiency may be lowered due to the misalignment of the acquired signals. Though the misalignment problem has been now solvable by various successful approaches in DPA, a lot of power traces are still required to find correct keys. Since the required number of power traces is directly connected with the efficiency of SCAs, we propose a key-search method even with relatively reduced number of power traces based on recognizing special patterns of the signal caused by cryptographic operations. Experimental results show that the proposed method is able to search correct keys with much smaller number of traces than the minimum number of traces with which the conventional methods of the energy-based DPA and frequency-based DPA succeed in finding keys.

Published in:

Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on

Date of Conference:

March 31 2008-April 4 2008