A Wavelet-based Power Analysis Attack against Random Delay Countermeasure

被引:0
|
作者
Dong, Xiaofei [1 ,2 ]
Zhang, Fan [1 ,2 ,3 ]
Queshi, Samiya [1 ]
Zhang, Yiran [1 ]
Liang, Ziyuan [1 ,3 ]
Yang, Bolin [1 ]
Gao, Feng [4 ]
机构
[1] Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou 310027, Zhejiang, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Zhejiang Univ, Inst Cyberspace Res, Hangzhou 310027, Zhejiang, Peoples R China
[4] Hangzhou Natl Chip Sci & Technol Co Ltd, Hangzhou 310012, Zhejiang, Peoples R China
来源
PROCEEDINGS OF THE 2018 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST) | 2018年
基金
中国国家自然科学基金;
关键词
Wavelet attack; Wavelet preprocessing; Random delay countermeasure; Side-channel analysis; Power analysis;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Random delay insertion is a simple yet rather effective technique to increase the difficulty 14 traditional power analysis. However as compared to the random masking technique, it is uncommonly used as a countermeasure considering the frequency analysis. In this paper, it is investigated that the frequency analysis may not work as efficiently as expected when facing to advanced random delay countermeasures. Hence, a novel attack is proposed which is in the wavelet domain. After preprocessing the wavelet coefficients of power traces with wavelet decomposition, the effects of multiple random delays can be removed. Two attack strategies are proposed to recover the secret key: either indirectly from the reconstructed power traces without random delays or directly from the processed wavelet. coefficients. Our experimental results show that the wavelet based power analysis attack can perform much better than those frequency-based ones, which is evaluated through several standard metrics to show the efficiency and robustness.
引用
收藏
页码:19 / 24
页数:6
相关论文
共 50 条
  • [41] Dynamic Countermeasure Against the Zero Power Analysis
    Danger, Jean-Luc
    Guilley, Sylvain
    Hoogvorst, Philippe
    Murdica, Cedric
    Naccache, David
    2013 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (IEEE ISSPIT 2013), 2013, : 140 - 147
  • [42] Wavelet-based algorithm for signal analysis
    Tse, Norman C. F.
    Lai, L. L.
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2007, 2007 (1)
  • [43] Analysis of a wavelet-based watermarking algorithm
    Guzmán, VVH
    Miyatake, MN
    Meana, HMP
    14TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS, AND COMPUTERS, PROCEEDINGS, 2004, : 283 - 287
  • [44] Wavelet-Based Analysis of Interference in WSNs
    Vlachaki, Aikaterini
    Nikolaidis, Ioanis
    Harms, Janelle
    2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2016, : 639 - 642
  • [45] On uncertainty in wavelet-based signal analysis
    Peretto, L
    Sasdelli, R
    Tinarelli, R
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2005, 54 (04) : 1593 - 1599
  • [46] Threshold analysis in wavelet-based denoising
    Zhang, L
    Bao, P
    Pan, Q
    ELECTRONICS LETTERS, 2001, 37 (24) : 1485 - 1486
  • [47] Wavelet-Based Algorithm for Signal Analysis
    Norman C.F. Tse
    L.L. Lai
    EURASIP Journal on Advances in Signal Processing, 2007
  • [48] Random Addition-chain Based Countermeasure Against Side-channel Attack for Advanced Encryption Standard
    Huang Hai
    Feng Xinxin
    Liu Hongyu
    Hou Jiao
    Zhao Yuying
    Yin Lili
    Jiang Jinxing
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (02) : 348 - 354
  • [49] Leakage Power Analysis (LPA) Attack in Breakdown Mode and Countermeasure
    Yu, Weize
    Wen, Yiming
    2018 31ST IEEE INTERNATIONAL SYSTEM-ON-CHIP CONFERENCE (SOCC), 2018, : 102 - 105
  • [50] AES power attack based on induced cache miss and countermeasure
    Bertoni, G
    Zaccaria, V
    ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 1, 2005, : 586 - 591