Leakage Characterizing and Detecting Based on Communication Theory

نویسندگان

  • Wei Yang
  • Yuchen Cao
  • Ke Ma
  • Hailong Zhang
  • Yongbin Zhou
  • Baofeng Li
چکیده

Evaluating the side-channel attacks (SCAs) resilience of a crypto device is important and necessary. The SCAs-secure evaluation criteria includes the information theoretic metric and the security metric. The former metric measures the leakage amount of a crypto device. It should be independent with the evaluator. However, the current metrics, e.g. mutual information (MI), conditional entropy and perceived information, are related to the leakage model selected by the evaluator. They only reflect the leakage utilization, rather than the real leakage level of a crypto device. In light of this, we analysis the side-channel as a communication channel and develop two objective metrics, the average MI and capacity of the channel, to characterize the real leakage amount and its upper bound of a crypto device through communication theory. Although the channel capacity is a rough estimation of the leakage amount of the device, it can furnish the leakage amount at the worst case scenario the device may leak. We investigate the estimation methods of the two metric in different noise scenes. Besides, a leakage detection method based on consistency check is developed subsequently. The proposed method are capable of finding the Point-Of-Interests (POIs) in leakage traces and introducing few leakage points cannot be used to mount SCAs. The experiments show the effectiveness of the proposed method.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Calculation of Leakage in Water Supply Network Based on Blind Source Separation Theory

The economic and environmental losses due to serious leakage in the urban water supply network have increased the effort to control the water leakage. However, current methods for leakage estimation are inaccurate leading to the development of ineffective leakage controls. Therefore, this study proposes a method based on the blind source separation theory (BSS) to calculate the leakage of water...

متن کامل

Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

متن کامل

Collusion Deterrence in Multi-Party Computation – An Evolutionary Game-Theoretic Approach

Many secure multiparty computation (SMC) protocols use Shamir’s Secret Sharing (SSS) scheme as a building block. A weakness of SSS is the possibility of collusion attacks among parties. Despite the shortcoming, SSS requires no data expansion and achieves information-theoretic security compared to other cryptographic SMC techniques such as garbled circuits. Moreover, it is much faster than other...

متن کامل

The effect of Therapeutic Communication based Peplau’s theory on anxiety and Resilience of patients admitted to the corona ward of Khatam Al-Anbia Hospital in Tehran

Introduction: In order to reduce the stress and anxiety caused by the spread of the Covid-19 disease, a beneficial and effective psychological variable such as resilience can play an adaptive role. Also, the therapeutic relationship is a meaningful and purposeful relationship between the nurse and the patient in order to solve the patient's problems and create adaptive responses. Purpose: The ...

متن کامل

A multi agent method for cell formation with uncertain situation, based on information theory

This paper assumes the cell formation problem as a distributed decision network. It proposes an approach based on application and extension of information theory concepts, in order to analyze informational complexity in an agent- based system, due to interdependence between agents. Based on this approach, new quantitative concepts and definitions are proposed in order to measure the amount of t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2016  شماره 

صفحات  -

تاریخ انتشار 2016