Differential Power Analysis Attacks Based on the Multiple Correlation Coefficient
- https://doi.org/10.2991/icsmim-15.2016.83How to use a DOI?
- side-channel attack, power analysis attack, DPA, second-order DPA, CPA, MCPA, AES.
In this paper we research a new power analysis attack method: the differential power analysis attacks based on the multiple correlation coefficient (MCPA). This attack method is based on statistical theory that multiple linear regression. Conditions of the MCPA method of attack are weaker than ones of CPA attacks. In this paper, we indicate that MCPA attacks have same effect with CPA attacks in this weak condition. We perform the simulated attacks and the practical attacks for the two kinds of attack methods to verify this conclusion. The results show that the conclusion is correct for the first-order DPA. We also describe the CPA attacks using simple linear regression model for comparison of two attack methods. The experiments results show that this chosen traces attack is stronger than the previous methods.
- © 2016, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Xiaoke Tang AU - Jie Gan AU - Jiachao Chen AU - Junrong Liu PY - 2016/01 DA - 2016/01 TI - Differential Power Analysis Attacks Based on the Multiple Correlation Coefficient BT - Proceedings of the 2015 4th International Conference on Sensors, Measurement and Intelligent Materials PB - Atlantis Press SP - 447 EP - 453 SN - 2352-538X UR - https://doi.org/10.2991/icsmim-15.2016.83 DO - https://doi.org/10.2991/icsmim-15.2016.83 ID - Tang2016/01 ER -