Power Consumption Attack Based on Improved Principal Component Analysis

Accompanied with the status quo and problems that the low efficiency in the traditional methods of principal component analysis (PCA) when we face the problems of correlated power attack with large amount of data, we presents an improved method to reduce the noise of power data by wavelet packet transform (WPT) and then reduce the dimension by traditional principal component analysis, based the conclusion we have arrived about the advantage of wavelet packet transform in signal processing. It is more productive than common methods in the data processing phase of the related power attack, especially on the occasion that we own high dimensional data with low signal to Noise Ratio (SNR). Just to show you where we can optimize, the middle position of SM4 encryption algorithm was selected to measure the power consumption, and compared with the results of traditional principal component analysis. The results show that not only is the number of curves has been significantly reduced, but the computational complexity has been decreased easily, by all means, the computational time is less than the original required time so that the attack efficiency is significantly improved. Aiming at the goal with a highly targeted way to reduce the amount of data which are needed to crack the key especially for course of power analysis, the proposal submitted by us have the certain advantages under this circumstance when we face the high latitude data with low SNR within the process of correlated power attack.

[1]  Rached Tourki,et al.  A Comparative Study of Power Consumption Models for CPA Attack , 2012 .

[2]  Zhongsheng Wang,et al.  Early Fault Feature Extraction of Rotor Imbalance and Self-Healing Monitoring , 2009, 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC).

[3]  Fayez Gebali,et al.  Classification of hardware trojan detection techniques , 2015, 2015 Tenth International Conference on Computer Engineering & Systems (ICCES).

[4]  Pankaj Rohatgi,et al.  Template Attacks , 2002, CHES.

[6]  Mo Haghighi Market-Based Resource Allocation for Energy-Efficient Execution of Multiple Concurrent Applications in Wireless Sensor Networks , 2013, MUSIC.

[7]  Fang Zhou,et al.  A new method for resisting collision attack based on parallel random delay S-box , 2019, IEICE Electron. Express.

[8]  Yu Wang,et al.  Research on drilling mud pump fault diagnosis based on fusion of acoustic emission and vibration technology , 2017 .

[9]  Dengguo Feng,et al.  Theoretical and practical aspects of multiple samples correlation power analysis , 2016, Secur. Commun. Networks.

[10]  Fengqi Yu,et al.  Correlation Power Analysis Attack against Synchronous Stream Ciphers , 2008, 2008 The 9th International Conference for Young Computer Scientists.

[11]  Xu Huang,et al.  Minimizing hamming weight based on 1's complement of binary numbers over GF(2m) , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).

[12]  S Sandeep,et al.  Differential power analysis on FPGA implementation of MICKEY 128 , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[13]  Mingliang Liu,et al.  Circuit Breaker Fault Analysis Based on Wavelet Packet Time - Frequency Entropy and LM Algorithm to Optimize BP Neural Network , 2018, 2018 37th Chinese Control Conference (CCC).

[14]  Guoqiang Bai,et al.  Low-cost hardware implementation of SM4 based on composite field , 2016, 2016 IEEE Information Technology, Networking, Electronic and Automation Control Conference.

[15]  Jean-Jacques Quisquater,et al.  ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.

[16]  Xu Sen,et al.  A combinational power analysis method against cryptographic hardware , 2015, China Communications.

[17]  Zhimin Zhang,et al.  A Chosen-Plaintext Method of CPA on SM4 Block Cipher , 2014, 2014 Tenth International Conference on Computational Intelligence and Security.

[18]  Degang Sun,et al.  Double-Key Recovery Based Correlation Power Analysis , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[19]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.