MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations

被引:0
|
作者
Camurati G. [1 ]
Dell’amico M. [2 ]
Standaert F.-X. [3 ]
机构
[1] ETH Zurich, Zurich
[2] University of Genoa, Genoa
[3] UC Louvain, Louvain
关键词
Key rank estimation; Monte Carlo methods; Side channel attacks;
D O I
10.46586/tches.v2023.i1.277-300
中图分类号
学科分类号
摘要
Key rank estimation provides a measure of the effort that the attacker has to spend bruteforcing the key of a cryptographic algorithm, after having gained some information from a side channel attack. We present MCRank, a novel method for key rank estimation based on Monte Carlo sampling. MCRank provides an unbiased estimate of the rank and a confidence interval. Its bounds rapidly become tight for increasing sample size, with a corresponding linear increase of the execution time. When applied to evaluate an AES-128 implementation, MCRank can be orders of magnitude faster than the state-of-the-art histogram-based enumeration method for comparable bound tightness. It also scales better than previous work for large keys, up to 2048 bytes. Besides its conceptual simplicity and efficiency, MCRank can assess for the first time the security of large keys even if the probability distributions given the side channel leakage are not independent between subkeys, which occurs, for example, when evaluating the leakage security of an AES-256 implementation. © 2022, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:277 / 300
页数:23
相关论文
共 50 条
  • [21] Evolvable Hardware Architectures on FPGA for Side-Channel Security
    Labafniya, Mansoureh
    Borujeni, Shahram Etemadi
    Mentens, Nele
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 163 - 180
  • [22] A Key Update Scheme for Side-Channel Attack Mitigation
    Gui, Yutian
    Tamore, Suyash Mohan
    Siddiqui, Ali Shuja
    Saqib, Fareena
    2019 IEEE 16TH INTERNATIONAL CONFERENCE ON SMART CITIES: IMPROVING QUALITY OF LIFE USING ICT, IOT AND AI (IEEE HONET-ICT 2019), 2019, : 187 - 188
  • [23] Combating Side-Channel Attacks Using Key Management
    Liu, Donggang
    Dong, Qi
    2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL & DISTRIBUTED PROCESSING, VOLS 1-5, 2009, : 3131 - 3138
  • [24] A Key to Success Success Exponents for Side-Channel Distinguishers
    Guilley, Sylvain
    Heuser, Annelie
    Rioul, Olivier
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2015, 2015, 9462 : 270 - 290
  • [25] A Frequency-based Leakage Assessment Methodology for Side-Channel Evaluations
    Lei, Wan
    Wang, Lihui
    Shan, Weijun
    Jiang, Kun
    Li, Qing
    2017 13TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2017, : 590 - 593
  • [26] Quantitative estimation of side-channel leaks with neural networks
    Saeid Tizpaz-Niari
    Pavol Černý
    Sriram Sankaranarayanan
    Ashutosh Trivedi
    International Journal on Software Tools for Technology Transfer, 2021, 23 : 641 - 654
  • [27] Passive Side-Channel Interference Estimation for WiFi Networks
    Onalan, Aysun Gurur
    Kurtoglu, Mehmet Hakan
    Soyak, Eren
    2021 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (IEEE BLACKSEACOM), 2021, : 225 - 230
  • [28] Quantitative estimation of side-channel leaks with neural networks
    Tizpaz-Niari, Saeid
    Cerny, Pavol
    Sankaranarayanan, Sriram
    Trivedi, Ashutosh
    INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2021, 23 (04) : 641 - 654
  • [29] Toward practical autoencoder-based side-channel analysis evaluations
    Paguada, Servio
    Batina, Lejla
    Armendariz, Igor
    COMPUTER NETWORKS, 2021, 196
  • [30] Security Network On-Chip for Mitigating Side-Channel Attacks
    Kenarangi, Farid
    Partin-Vaisband, Inna
    2019 ACM/IEEE INTERNATIONAL WORKSHOP ON SYSTEM LEVEL INTERCONNECT PREDICTION (SLIP), 2019,