DocumentCode :
3726899
Title :
A heuristic approach to identify AES cryptosystem from the power traces
Author :
Hridoy Jyoti Mahanta;Ajoy Kumar Khan
Author_Institution :
Department of Computer Science Engineering, Assam University, Silchar, India
fYear :
2015
Firstpage :
360
Lastpage :
363
Abstract :
Power consumption of a device can be a major source of side channel information. This fact was brought forward by Kocher et. al. when they introduced the concept of power analysis attack. Although this kind of analysis is mainly used to break the security of a cryptosystem by finding the secret key, it can also give information to identify what kind of cryptosystem it is. The power traces which are extracted during such analysis are plotted against time and power consumed. These features can reveal the source of these traces if analyzed carefully. In this paper we try make analysis of AES power traces and find the features that may help us identify the source. 200 power traces were collected form an open source of which 100 traces were used for extracting their features and then this features were tested in other 100. Almost 67% of the testing traces were found to have similar features leading to identify the source of these traces.
Keywords :
"Cryptography","Clocks","Indexes","Computers"
Publisher :
ieee
Conference_Titel :
Advanced Computing and Communication (ISACC), 2015 International Symposium on
Print_ISBN :
978-1-4673-6707-3
Type :
conf
DOI :
10.1109/ISACC.2015.7377370
Filename :
7377370
Link To Document :
بازگشت