TY - GEN
T1 - Adaptive chosen-plaintext correlation power analysis
AU - Hu, Wenjing
AU - Wu, Liji
AU - Wang, An
AU - Xie, Xinjun
AU - Zhu, Zhihui
AU - Luo, Shun
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2015/1/20
Y1 - 2015/1/20
N2 - Yongdae K ea al. poposed biasing power traces to improve correlation in power analysis attack in 2010. However this method abandons large numbers of power traces which is unreasonable in comparison with traditional CPA. In this paper, the traces acquirement process is divided into two stages. In the first stage, some plaintexts are chosen randomly and two most probable key byte candidates are recovered. In the second stage, we adaptively choose specific plaintexts corresponding to the traces with high signal-to-noise ratio, encrypt them, and acquire the second batch of traces. So the attack can be finished with fewer traces. According to our experiments on AT89S52 software implementation of AES, getting the same success rate 0.955, our adaptive chosen-plaintext CPA only requires 78.9% traces of traditional CPA. Our proposal can be implemented by automatic software through two interactions with the AT89S52.
AB - Yongdae K ea al. poposed biasing power traces to improve correlation in power analysis attack in 2010. However this method abandons large numbers of power traces which is unreasonable in comparison with traditional CPA. In this paper, the traces acquirement process is divided into two stages. In the first stage, some plaintexts are chosen randomly and two most probable key byte candidates are recovered. In the second stage, we adaptively choose specific plaintexts corresponding to the traces with high signal-to-noise ratio, encrypt them, and acquire the second batch of traces. So the attack can be finished with fewer traces. According to our experiments on AT89S52 software implementation of AES, getting the same success rate 0.955, our adaptive chosen-plaintext CPA only requires 78.9% traces of traditional CPA. Our proposal can be implemented by automatic software through two interactions with the AT89S52.
KW - Adaptive chosen-plaintext attack
KW - Advanced encryption standard
KW - Correlation power analysis
KW - Hamming weight power model
UR - http://www.scopus.com/inward/record.url?scp=84922880115&partnerID=8YFLogxK
U2 - 10.1109/CIS.2014.94
DO - 10.1109/CIS.2014.94
M3 - Conference contribution
AN - SCOPUS:84922880115
T3 - Proceedings - 2014 10th International Conference on Computational Intelligence and Security, CIS 2014
SP - 494
EP - 498
BT - Proceedings - 2014 10th International Conference on Computational Intelligence and Security, CIS 2014
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 10th International Conference on Computational Intelligence and Security, CIS 2014
Y2 - 15 November 2014 through 16 November 2014
ER -