Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Efficient Correlation Power Analysis (CPA) Focusing on Byte-Wise Calculation Points

Full metadata record
DC Field Value Language
dc.contributor.authorJeon, Youngbae-
dc.contributor.authorJung, Ji Hyuk-
dc.contributor.authorYoon, Ji Won-
dc.date.accessioned2022-03-12T22:40:21Z-
dc.date.available2022-03-12T22:40:21Z-
dc.date.created2021-12-07-
dc.date.issued2021-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/138774-
dc.description.abstractCorrelation Power Analysis (CPA) uses a lot of computational resources for deploying side-channel analysis to power traces. For every guessing key, it searches all data points and all power traces to reveal the secret key implemented in the encryption module. In this work, we propose a novel technique to narrow down the target region for applying CPA to the power traces. As byte-wise operations occur in every clock period, the assumed amplitude value based on the power consumption model and the actual amplitude are most correlated at the points where the peaks are observed. We extract the calculation points of each power trace using signal processing and machine learning techniques, and select the region where the CPA will be applied to. Our proposed approach achieves an approximately 20% improvement in accuracy and requires less computational resources compared to conventional CPA.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.subjectIMPLEMENTATIONS-
dc.titleEfficient Correlation Power Analysis (CPA) Focusing on Byte-Wise Calculation Points-
dc.typeArticle-
dc.contributor.affiliatedAuthorYoon, Ji Won-
dc.identifier.doi10.1109/ACCESS.2021.3079960-
dc.identifier.scopusid2-s2.0-85105881411-
dc.identifier.wosid000673534000001-
dc.identifier.bibliographicCitationIEEE ACCESS, v.9, pp.74275 - 74285-
dc.relation.isPartOfIEEE ACCESS-
dc.citation.titleIEEE ACCESS-
dc.citation.volume9-
dc.citation.startPage74275-
dc.citation.endPage74285-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusIMPLEMENTATIONS-
dc.subject.keywordAuthorClocks-
dc.subject.keywordAuthorPower demand-
dc.subject.keywordAuthorCorrelation-
dc.subject.keywordAuthorEncryption-
dc.subject.keywordAuthorPower measurement-
dc.subject.keywordAuthorTime complexity-
dc.subject.keywordAuthorDetection algorithms-
dc.subject.keywordAuthorSide-channel analysis-
dc.subject.keywordAuthorcorrelation power analysis-
dc.subject.keywordAuthorsimple power analysis-
dc.subject.keywordAuthorpeak detection-
dc.subject.keywordAuthork-means algorithm-
dc.subject.keywordAuthorAES-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Yoon, Ji Won photo

Yoon, Ji Won
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE