Abstract
In essence, side-channel leakages produced during the execution of crypto implementations are noisy physical measurements. It turns out that various noises contained in leakages have, in general, negative effects on the key-recovery efficiency of side-channel attacks. Therefore, in practice, frequency-based denoising methods are presented and in wide use nowadays. However, most of them for reducing noises of high-frequency are not always effective, and they sometimes do little or even no help. On the other hand, the relationship between noises extracted with different denoising methods that target different frequencies, in time-domain, is not being discussed, which in turn will determine the potential power of combining these denoising methods. Motivated by this, we present two empirical mode decomposition (EMD) based denoising methods for side-channel attacks, and study their effectiveness in reducing noises of high frequency in real power traces. Compared with their counterparts, EMD-based denoising methods achieve both effectiveness and stability. Furthermore, we investigate the relationships between the noises extracted with denoising methods that target different frequencies, by performing attacks on real power traces denoised by multiple combinations of different denoising methods. For this purpose, we define the notion of overlapping coefficient, which measures how much that noises are overlapped with each other. Our results and observations are evidently verified by correlation power analysis attacks on multiple real power traces sets.
Chapter PDF
Similar content being viewed by others
Keywords
References
Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)
Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004)
Charvet, X., Pelletier, H.: Improving the DPA attack using Wavelet transform. In: Non-Invasive Attack Testing Workshop 2005 (2005)
Souissi, Y., Aabid, M., Debande, N., Guilley, S., Danger, J.: Novel Applications of Wavelet Transforms based Side-Channel Analysis. In: Non-Invasive Attack Testing Workshop 2011 (2011)
Cao, Y., Zhou, Y., Yu, Z.: On the Negative Effects of Trend Noise and Its Applications in Side-Channel Cryptanalysis, http://eprint.iacr.org/2013/102.pdf
Batina, L., Hogenboom, J., van Woudenberg, J.G.J.: Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol. 7178, pp. 383–397. Springer, Heidelberg (2012)
Standaert, F., Malkin, T., Yung, M.: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 443–461. Springer, Heidelberg (2009)
Doget, J., Prouff, E., Rivain, M., Standaert, F.X.: Univariate side channel attacks and leakage modeling. Journal of Cryptographic Engineering 1, 123–144 (2011)
Huang, N.E., et al.: The empirical mode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis. Proc. Roy. Soc. London A 454, 903–995 (1998)
Cohen, L.: Time-Frequency Analysis. Prentice- Hall, Englewood Cliffs (1995)
Flandrin, P., Rilling, G., Goncalves, P.: EMD equivalent filter banks, from interpetation to applications. In: Huang, N.E., Shen, S. (eds.) Hilbert-Huang Transform and Its Applications, 1st edn. World Scientific, Singapore (2005)
Mallat, S.: A Wavelet Tour of Signal Processing, 2nd edn. Academic, New York (1999)
Kopsinis, Y., McLaughlin, S.: Development of EMD-Based Denoising Methods Inspired by Wavelet Thresholding. IEEE Transactions on Signal Processing 57(4) (April 2009)
Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer (2007)
Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)
Agrawal, D., Archambeault, B., Rao, J., Rohatgi, P.: The EM side-channel(s). In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 29–45. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer International Publishing Switzerland
About this paper
Cite this paper
Feng, M., Zhou, Y., Yu, Z. (2013). EMD-Based Denoising for Side-Channel Attacks and Relationships between the Noises Extracted with Different Denoising Methods. In: Qing, S., Zhou, J., Liu, D. (eds) Information and Communications Security. ICICS 2013. Lecture Notes in Computer Science, vol 8233. Springer, Cham. https://doi.org/10.1007/978-3-319-02726-5_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-02726-5_19
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-02725-8
Online ISBN: 978-3-319-02726-5
eBook Packages: Computer ScienceComputer Science (R0)