New Pre-processing Method for Second-Order CPA on the IT Convergence Device 


Vol. 35,  No. 9, pp. 1369-1380, Sep.  2010


PDF
  Abstract

In this paper, we propose the efficient Second-Order Differential Power Analysis attack, which has ability to find significant information such as secret key in the devices consisting IT convergence environment such as Smartgrid, Advanced Metering Infrastructure(AMI) and ZigBee-based home networking service. This method helps to find the secret key easily at a device, even though it uses a countermeasure like masking which makes First-Order DPA attack harder. First, we present the performance results of our implementation which implements practical Second-Order DPA attack using the existing preprocessing function, and analyze it. Then we propose a stronger preprocessing function which overcomes countermeasures like masking. Finally, we analyze the results of the Second-Order CPA attack using proposed preprocessing function and verify that proposed scheme is very threatening to the security fields of IT convergence technology through the experimental results.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

C. Lee, A. Hwang, D. Lee, H. Kim, H. Kim, "New Pre-processing Method for Second-Order CPA on the IT Convergence Device," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 9, pp. 1369-1380, 2010. DOI: .

[ACM Style]

Chulhee Lee, Ahreum Hwang, Donggeon Lee, Hyoungnam Kim, and Howon Kim. 2010. New Pre-processing Method for Second-Order CPA on the IT Convergence Device. The Journal of Korean Institute of Communications and Information Sciences, 35, 9, (2010), 1369-1380. DOI: .

[KICS Style]

Chulhee Lee, Ahreum Hwang, Donggeon Lee, Hyoungnam Kim, Howon Kim, "New Pre-processing Method for Second-Order CPA on the IT Convergence Device," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 9, pp. 1369-1380, 9. 2010.