Side-Channel Leakage Evaluation and Detection Based on Communication Theory

نویسندگان

  • Wei Yang
  • Yuchen Cao
  • Ke Ma
  • Hailong Zhang
چکیده

Side-channel attacks (SCAs) have been a realistic serious threat to crypto devices. Therefore, evaluating the SCAs resilience of a crypto device is important and necessary. The SCAs-secure evaluation criteria includes the information theoretic metric and the security metric. The former metric, i.e. mutual information (MI), measures the leakage amount of a crypto device. However, because the real leakage distribution of a crypto device is unknown, the leakage evaluation is difficult. Commonly, there are two ways to estimate the leakage distribution of a device, i.e. non-parametric ones and parametric ones. The former may bring a big error since the leakage model is not accurate. The latter is more precise since it can profile the leakage model, but may be infeasible in practice. To combine the merits of the two estimation ways, we bypass the direct estimation of the device’s leakage distribution, and propose a non-profiling parametric estimation method. We analyze the side-channel as a communication channel, and use the average MI of the communication channel to estimate the side-channel MI. Besides, we find that the channel capacity can furnish an upper bound of the leakage amount of the device. Interestingly, based on the communication channel characteristic, we find that if we do consistency check for the channel parameters, a leakage detection method can be developed. Furthermore, the proposed method is capable of finding the Point-Of-Interests (POIs) in leakage traces and introducing few leakage points that cannot be used to mount SCAs. Finally, the experiments show the effectiveness of the proposed methods about leakage evaluation and detection.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Leakage Characterizing and Detecting Based on Communication Theory

Evaluating the side-channel attacks (SCAs) resilience of a crypto device is important and necessary. The SCAs-secure evaluation criteria includes the information theoretic metric and the security metric. The former metric measures the leakage amount of a crypto device. It should be independent with the evaluator. However, the current metrics, e.g. mutual information (MI), conditional entropy an...

متن کامل

From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces

Leakage detection usually refers to the task of identifying data-dependent information in side-channel measurements, independent of whether this information can be exploited. Detecting Points-Of-Interest (POIs) in leakage traces is a complementary task that is a necessary first step in most side-channel attacks, where the adversary wants to turn this information into (e.g.) a key recovery. In t...

متن کامل

Side Channel Leakage Analysis

Nearly twenty years ago the discovery of side channel attacks has warned the world that security is more than just a mathematical problem. Serious considerations need to be placed on the implementation and its physical media. Nowadays the ever-growing ubiquitous computing calls for in-pace development of security solutions. Although the physical security has attracted increasing public attentio...

متن کامل

Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests

The development of a leakage detection testing methodology for the side-channel resistance of cryptographic devices is an issue that has received recent focus from standardisation bodies such as NIST. Statistical techniques such as hypothesis and signi cance testing appear to be ideally suited for this purpose. In this work we evaluate the candidacy of three such detection tests: a t-test propo...

متن کامل

Towards Sound and Optimal Leakage Detection Procedure

Evaluation of side channel leakage for the embedded crypto systems requires sound leakage detection procedures. We relate the test vector leakage assessment (TVLA) procedure to the statistical minimum p-value (mini-p) procedure, and propose a sound method of deciding leakage existence in the statistical hypothesis setting. To improve detection, an advanced statistical procedure Higher Criticism...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017