Journal on Communications ›› 2014, Vol. 35 ›› Issue (3): 157-167.doi: 10.3969/j.issn.1000-436x.2014.03.018

• Academic paper • Previous Articles     Next Articles

Research of power preprocessing optimization-based template attack on LED

Xiao-juan WANG1,Shi-ze GUO2,Xin-jie ZHAO2,3,Mei SONG1,Fan ZHANG4   

  1. 1 School of Electronic Engineering,Beijing University of Posts and Telecommunications,Beijing 100876,China
    2 Institute of North Electronic Equipment,Beijing 100083,China
    3 Department of Information Engineering,Ordnance Engineering College,Shijiazhuang 050003,China
    4 Department of Computer Science and Engineering,University of Connecticut,Storrs 06269,USA
  • Online:2014-03-25 Published:2017-08-17
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China

Abstract:

The security of LED,a lightweight block cipher proposed in CHES 2011,was evaluated by the template attack (TA).Several improvements of TA from the perspective of the preprocessing optimization was proposed.Firstly,the noise offset was calculated by using the phase-only correlation factor in the frequency view of the power trace to eliminate the data interference in the template building phase.Secondly,a novel character extracting method was proposed based on calculating the cross-cluster offset of different clusters classified by the plaintexts to cut the different leakage points from the power traces automatically.Thirdly,a dynamic effective power points choosing strategy was proposed by utilizing the mean value and the noises of the of power traces to evaluate the differences between different templates and improve the utilization of side channel information.Experiment results demonstrate that the proposed techniques of data alignment and automatically data cutting enlarge the differences of templates and reduce the number of the required power trace in both the template building and attacking phase.The proposed effective power points choosing strategy reduces the data complexity of the attack and only two power traces are required to launch the attack with the success rate of 100%.

Key words: power preprocessing, data alignment, data cutting, interesting points selection, template attack, LED

No Suggested Reading articles found!