IDEAS home Printed from https://ideas.repec.org/a/igg/jisp00/v12y2018i3p27-41.html
   My bibliography  Save this article

Improving Power Analysis Peak Distribution Using Canberra Distance to Address Ghost Peak Problem

Author

Listed:
  • Hridoy Jyoti Mahanta

    (Computer Science and Engineering, Assam University, Silchar, India)

  • Ajoy Kumar Khan

    (Computer Science and Engineering, Assam University, Silchar, India)

Abstract

This article describes how differential power analysis has laid the foundations of such an attack that has challenged the security of almost all cryptosystems like DES, AES, and RSA. This non-invasive attack first extracts the power consumption details from devices embedded with cryptographic techniques and then uses these details to mount attacks on the cryptosystems to reveal the secret key. However, at times there appears multiple similar power peaks at the same points. This raises confusion in distinguishing the actual and the fake peaks named “ghost peaks.” This ghost peak problem affects the efficiency of power analysis attacks as it increases the number of power traces to be evaluated to identify the actual peak. In this article, the authors present an approach which uses the Canberra distance with Euclidean similarity to address this ghost peak problem. The proposed solution diminishes the values of all these ghost peaks, leaving only the actual peak behind that could reveal the secret key.

Suggested Citation

  • Hridoy Jyoti Mahanta & Ajoy Kumar Khan, 2018. "Improving Power Analysis Peak Distribution Using Canberra Distance to Address Ghost Peak Problem," International Journal of Information Security and Privacy (IJISP), IGI Global, vol. 12(3), pages 27-41, July.
  • Handle: RePEc:igg:jisp00:v:12:y:2018:i:3:p:27-41
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJISP.2018070103
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jisp00:v:12:y:2018:i:3:p:27-41. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.