RFA: R-Squared Fitting Analysis Model for Power Attack

Correlation Power Analysis (CPA) introduced by Brier et al. in 2004 is an important method in the side-channel attack and it enables the attacker to use less cost to derive secret or private keys with efficiency over the last decade. In this paper, we propose R-squared fitting model analysis (RFA) w...

Full description

Bibliographic Details
Main Authors: An Wang, Yu Zhang, Liehuang Zhu, Weina Tian, Rixin Xu, Guoshuang Zhang
Format: Article
Language:English
Published: Hindawi-Wiley 2017-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2017/5098626
id doaj-fc9f6477c31a41d289fb3aac013ea8cd
record_format Article
spelling doaj-fc9f6477c31a41d289fb3aac013ea8cd2020-11-25T00:01:31ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222017-01-01201710.1155/2017/50986265098626RFA: R-Squared Fitting Analysis Model for Power AttackAn Wang0Yu Zhang1Liehuang Zhu2Weina Tian3Rixin Xu4Guoshuang Zhang5The School of Computer Science, Beijing Institute of Technology, Beijing 100081, ChinaThe School of Computer Science, Beijing Institute of Technology, Beijing 100081, ChinaThe School of Computer Science, Beijing Institute of Technology, Beijing 100081, ChinaThe College of Bioengineering, Beijing Polytechnic, Beijing 100176, ChinaThe School of Computer Science, Beijing Institute of Technology, Beijing 100081, ChinaThe Science and Technology on Information Assurance Laboratory, Beijing 100072, ChinaCorrelation Power Analysis (CPA) introduced by Brier et al. in 2004 is an important method in the side-channel attack and it enables the attacker to use less cost to derive secret or private keys with efficiency over the last decade. In this paper, we propose R-squared fitting model analysis (RFA) which is more appropriate for nonlinear correlation analysis. This model can also be applied to other side-channel methods such as second-order CPA and collision-correlation power attack. Our experiments show that the RFA-based attacks bring significant advantages in both time complexity and success rate.http://dx.doi.org/10.1155/2017/5098626
collection DOAJ
language English
format Article
sources DOAJ
author An Wang
Yu Zhang
Liehuang Zhu
Weina Tian
Rixin Xu
Guoshuang Zhang
spellingShingle An Wang
Yu Zhang
Liehuang Zhu
Weina Tian
Rixin Xu
Guoshuang Zhang
RFA: R-Squared Fitting Analysis Model for Power Attack
Security and Communication Networks
author_facet An Wang
Yu Zhang
Liehuang Zhu
Weina Tian
Rixin Xu
Guoshuang Zhang
author_sort An Wang
title RFA: R-Squared Fitting Analysis Model for Power Attack
title_short RFA: R-Squared Fitting Analysis Model for Power Attack
title_full RFA: R-Squared Fitting Analysis Model for Power Attack
title_fullStr RFA: R-Squared Fitting Analysis Model for Power Attack
title_full_unstemmed RFA: R-Squared Fitting Analysis Model for Power Attack
title_sort rfa: r-squared fitting analysis model for power attack
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2017-01-01
description Correlation Power Analysis (CPA) introduced by Brier et al. in 2004 is an important method in the side-channel attack and it enables the attacker to use less cost to derive secret or private keys with efficiency over the last decade. In this paper, we propose R-squared fitting model analysis (RFA) which is more appropriate for nonlinear correlation analysis. This model can also be applied to other side-channel methods such as second-order CPA and collision-correlation power attack. Our experiments show that the RFA-based attacks bring significant advantages in both time complexity and success rate.
url http://dx.doi.org/10.1155/2017/5098626
work_keys_str_mv AT anwang rfarsquaredfittinganalysismodelforpowerattack
AT yuzhang rfarsquaredfittinganalysismodelforpowerattack
AT liehuangzhu rfarsquaredfittinganalysismodelforpowerattack
AT weinatian rfarsquaredfittinganalysismodelforpowerattack
AT rixinxu rfarsquaredfittinganalysismodelforpowerattack
AT guoshuangzhang rfarsquaredfittinganalysismodelforpowerattack
_version_ 1725441706059366400