Overcoming significant noise: Correlation-template-induction attack

An Wang*, Man Chen, Zongyue Wang, Yaoling Ding

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

Due to low Signal to Noise Ratio (SNR) in general experimental environments, previous attack methods such as correlation power analysis (CPA) do not always screen out the correct key value. Sometimes the success rate of the attack is so slight that we have to find other ways to make certain of the prosperity. In this paper, rather than adopting the traditional means of singling out a single key value, we suggest a way of setting up a threshold for the attack. Accordingly, we propose a feasible method to filter the inherently enlarging candidate key space, which is called correlation-template-induction attack. The method contains three steps: First, we apply a variation of CPA and get a set of candidate key values. Then, we filter the candidate key space with template attack, which is easy to implement and requires encryptions of just a few input data to screen out the correct key. Next, to achieve optimal of our attack, we mix the concept of induction together with our attack. The experimental results given in this article on an AES smart card implementation guarantee the effectiveness of our method.

Original languageEnglish
Title of host publicationInformation Security Practice and Experience - 8th International Conference, ISPEC 2012, Proceedings
Pages393-404
Number of pages12
DOIs
Publication statusPublished - 2012
Externally publishedYes
Event8th International Conference on Information Security Practice and Experience, ISPEC 2012 - Hangzhou, China
Duration: 9 Apr 201212 Apr 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7232 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference8th International Conference on Information Security Practice and Experience, ISPEC 2012
Country/TerritoryChina
CityHangzhou
Period9/04/1212/04/12

Keywords

  • correlation power analysis
  • correlation-template-induction attack
  • power analysis attack
  • template attack

Fingerprint

Dive into the research topics of 'Overcoming significant noise: Correlation-template-induction attack'. Together they form a unique fingerprint.

Cite this