An Efficient Correlation Power Analysis Attack Using Variational Mode Decomposition
Main Article Content
Abstract
Side channel attacks (SCAs) is now a real threat to cryptographic devices and correlation power analysis (CPA) is the most powerful attack. So far, CPA attack usually exploits the leakage information from raw power consumption traces that collected from attack device. In real attack scenarios, these traces collected from measurement equipment are usually contaminated by noise resulting in a decreases of attack efficiency. In this paper, we propose a variant CPA attack that exploits the leakage information from intrinsic mode functions (IMFs) of the power traces. These IMFs are the results of variational mode decomposition (VMD) process on the raw power traces. This attack technique decreases the number of power trace for correctly recovering the secret key by approximately 13% in normal condition and 60% in noisy condition compared to traditional CPA attack. Experiments were performed on power traces collected from the Atmega8515 smart card run on the Sakura-G/W side channel evaluation board to verify the effectiveness of our method.
Keywords
Side channel attack, Correlation power analysis, Variational mode decomposition
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
References
[2] S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, New York: USA: Springer, 2010.
[3] E. Brier, C. Clavier, F. Olivier, Correlation power analysis with a leakage model, in Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, Cambridge (USA), 2004. https://doi.org/10.1007/978-3-540-28632-5_2
[4] D. Oswald and C. Paar, Improving side-channel analysis with optimal linear transforms, in Tnternational Conference on Smart Card Research and Advanced Applications, 2012. https://doi.org/10.1007/978-3-642-37288-9_15
[5] A. Barenghi, G. Pelosi, and Y. Teglia, lnformation leakage discovery techniques to enhance secure chip design, in International Workshop on information Security Theory and Practices, 2011. https://doi.org/10.1007/978-3-642-21040-2_9
[6] Y. Souissi, M. A. Elaabid, N. Debande, S. Guilley, and J.-L. Danger, Novel applications of wavelet transforms based side-channel analysis, in Non-Invasive Attack Testing Workshop, 2011
[7] A. Park, D.-G. Han, and J. Ryoo, CPA performance comparison based on Wavelet Transform, in Security Technology (ICCST), 2012 IEEE International Carnahan Coriference, 2012. https://doi.org/10.1109/CCST.2012.6393559
[8] T-H. Le, J. Cl6diere, C. Serviere, and J.-L. Lacoume, Noise reduction in side channel attack using fourthorder cumulant, in IEEE Transactions on Information Forensics and Security, 2007.
[9] Y. Souissi, S. Guilley, J.-1. Danger, S. Mekki, and G. Duc, Improvement of power analysis attacks using Kalman filter, in IEEE International Conference on Acoustics, Speech and Signal Processing, 2010. https://doi.org/10.1109/ICASSP.2010.5495428
[10] K. Dragomiretskiy and D. Zosso, Variational Mode Decomposition, IEEE Transactions on Signal Processing, vol. 62, no. 3, pp. 531-544, 2014. https://doi.org/10.1109/TSP.2013.2288675.