{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T05:10:03Z","timestamp":1751692203864,"version":"3.41.0"},"reference-count":27,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"abstract":"<jats:p>This article describes how differential power analysis has laid the foundations of such an attack that has challenged the security of almost all cryptosystems like DES, AES, and RSA. This non-invasive attack first extracts the power consumption details from devices embedded with cryptographic techniques and then uses these details to mount attacks on the cryptosystems to reveal the secret key. However, at times there appears multiple similar power peaks at the same points. This raises confusion in distinguishing the actual and the fake peaks named \u201cghost peaks.\u201d This ghost peak problem affects the efficiency of power analysis attacks as it increases the number of power traces to be evaluated to identify the actual peak. In this article, the authors present an approach which uses the Canberra distance with Euclidean similarity to address this ghost peak problem. The proposed solution diminishes the values of all these ghost peaks, leaving only the actual peak behind that could reveal the secret key.<\/jats:p>","DOI":"10.4018\/ijisp.2018070103","type":"journal-article","created":{"date-parts":[[2018,6,15]],"date-time":"2018-06-15T18:54:03Z","timestamp":1529088843000},"page":"27-41","source":"Crossref","is-referenced-by-count":1,"title":["Improving Power Analysis Peak Distribution Using Canberra Distance to Address Ghost Peak Problem"],"prefix":"10.4018","volume":"12","author":[{"given":"Hridoy Jyoti","family":"Mahanta","sequence":"first","affiliation":[{"name":"Computer Science and Engineering, Assam University, Silchar, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ajoy Kumar","family":"Khan","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, Assam University, Silchar, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"2432","reference":[{"key":"IJISP.2018070103-0","article-title":"Generalized correlation power analysis.","volume":"Vol. 518","author":"S.Aumonier","year":"2007","journal-title":"Proceedings of the Ecrypt Workshop Tools For Cryptanalysis"},{"key":"IJISP.2018070103-1","unstructured":"Brier, E., Clavier, C., & Olivier, F. (2003). Optimal Statistical Power Analysis. IACR Cryptology ePrint Archive, 2003, 152."},{"key":"IJISP.2018070103-2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"IJISP.2018070103-3","unstructured":"Fujimoto, D., Miura, N., Nagata, M., Hayashi, Y., Homma, N., Aoki, T., & Bringer, J. (2014, May). Correlation power analysis using bit-level biased activity plaintexts against AES cores with countermeasures. In 2014 International Symposium on Electromagnetic Compatibility, Tokyo (EMC'14\/Tokyo) (pp. 306-309). IEEE."},{"key":"IJISP.2018070103-4","unstructured":"Gebotys, C. H. (2007). Third order differential analysis and a split mask countermeasure for low energy embedded processors."},{"key":"IJISP.2018070103-5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11925-5_16"},{"key":"IJISP.2018070103-6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_27"},{"key":"IJISP.2018070103-7","first-page":"198","article-title":"Multiplicative masking and power analysis of AES","author":"J. D.Goli\u0107","year":"2002","journal-title":"Cryptographic Hardware and Embedded Systems-CHES 2002"},{"key":"IJISP.2018070103-8","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2014.94"},{"key":"IJISP.2018070103-9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_1"},{"key":"IJISP.2018070103-10","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_22"},{"key":"IJISP.2018070103-11","doi-asserted-by":"crossref","unstructured":"Kamoun, N. M., Bossuet, L., & Ghazel, A. (2010, December). Experimental Implementation of 2ODPA attacks on AES design with flash-based FPGA Technology. In Microelectronics (ICM), 2010 International Conference on (pp. 407-410). IEEE.","DOI":"10.1109\/ICM.2010.5696173"},{"key":"IJISP.2018070103-12","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2015.228"},{"key":"IJISP.2018070103-13","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig.2008.16"},{"key":"IJISP.2018070103-14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"IJISP.2018070103-15","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_14"},{"key":"IJISP.2018070103-16","doi-asserted-by":"publisher","DOI":"10.1109\/ICYCS.2008.230"},{"key":"IJISP.2018070103-17","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2010.75"},{"key":"IJISP.2018070103-18","volume":"Vol. 31","author":"S.Mangard","year":"2008","journal-title":"Power analysis attacks: Revealing the secrets of smart cards"},{"key":"IJISP.2018070103-19","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44499-8_19"},{"key":"IJISP.2018070103-20","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_13"},{"key":"IJISP.2018070103-21","first-page":"241","article-title":"Improving DPA by peak distribution analysis","author":"J.Pan","year":"2010","journal-title":"Selected Areas in Cryptography"},{"key":"IJISP.2018070103-22","doi-asserted-by":"crossref","unstructured":"Sun, S., Yan, Z., & Zambreno, J. (2008, May). Experiments in attacking FPGA-based embedded systems using differential power analysis. In IEEE International Conference on Electro\/Information Technology EIT \u201908 (pp. 7-12). IEEE.","DOI":"10.1109\/EIT.2008.4554259"},{"key":"IJISP.2018070103-23","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-012-4588-5"},{"journal-title":"Differential power analysis attack on FPGA implementation of AES","year":"2008","author":"R.Velegalati","key":"IJISP.2018070103-24"},{"key":"IJISP.2018070103-25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_1"},{"key":"IJISP.2018070103-26","doi-asserted-by":"publisher","DOI":"10.1109\/ICYCS.2008.8"}],"container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=208125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T04:30:41Z","timestamp":1751689841000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISP.2018070103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":27,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.4018\/ijisp.2018070103","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"type":"print","value":"1930-1650"},{"type":"electronic","value":"1930-1669"}],"subject":[],"published":{"date-parts":[[2018,7]]}}}