Information Bounds and Convergence Rates for Side-Channel Security Evaluators

被引:0
|
作者
Masure L. [1 ]
Cassiers G. [2 ]
Hendrickx J. [1 ]
Standaert F.-X. [1 ]
机构
[1] UCLouvain, ICTEAM, Crypto Group, Louvain-la-Neuve
[2] TU Graz, Graz
基金
欧洲研究理事会;
关键词
Perceived Information; Profiled Attacks; Training Information;
D O I
10.46586/tches.v2023.i3.522-569
中图分类号
学科分类号
摘要
Current side-channel evaluation methodologies exhibit a gap between inefficient tools offering strong theoretical guarantees and efficient tools only offering heuristic (sometimes case-specific) guarantees. Profiled attacks based on the empirical leakage distribution correspond to the first category. Bronchain et al. showed at Crypto 2019 that they allow bounding the worst-case security level of an implementation, but the bounds become loose as the leakage dimensionality increases. Template attacks and machine learning models are examples of the second category. In view of the increasing popularity of such parametric tools in the literature, a natural question is whether the information they can extract can be bounded. In this paper, we first show that a metric conjectured to be useful for this purpose, the hypothetical information, does not offer such a general bound. It only does when the assumptions exploited by a parametric model match the true leakage distribution. We therefore introduce a new metric, the training information, that provides the guarantees that were conjectured for the hypothetical information for practically-relevant models. We next initiate a study of the convergence rates of profiled side-channel distinguishers which clarifies, to the best of our knowledge for the first time, the parameters that influence the complexity of a profiling. On the one hand, the latter has practical consequences for evaluators as it can guide them in choosing the appropriate modeling tool depending on the implementation (e.g., protected or not) and contexts (e.g., granting them access to the countermeasures’ randomness or not). It also allows anticipating the amount of measurements needed to guarantee a sufficient model quality. On the other hand, our results connect and exhibit differences between side-channel analysis and statistical learning theory. © 2023, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:522 / 569
页数:47
相关论文
共 50 条
  • [21] Pinpointing side-channel information leaks in web applications
    Mather, Luke
    Oswald, Elisabeth
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (03) : 161 - 177
  • [22] Breaking Fault Attack Countermeasures With Side-Channel Information
    Zheng, Shihui
    Xing, Ruihao
    Lai, Junlong
    Liu, Junkai
    Wang, Haofeng
    Ou, Changhai
    IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (05) : 1396 - 1408
  • [23] Protecting cryptographic integrated circuits with side-channel information
    Nagata, Makoto
    Fujimoto, Daisuke
    Miura, Noriyuki
    Homma, Naofumi
    Hayashi, Yu-ichi
    Sakiyama, Kazuo
    IEICE ELECTRONICS EXPRESS, 2017, 14 (02): : 1 - 13
  • [24] Analysis of Side-Channel Attack Based on Information Theory
    Mizuno, Hiroaki
    Iwai, Keisuke
    Tanaka, Hidema
    Kurokawa, Takakazu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (07) : 1523 - 1532
  • [25] Security Network On-Chip for Mitigating Side-Channel Attacks
    Kenarangi, Farid
    Partin-Vaisband, Inna
    2019 ACM/IEEE INTERNATIONAL WORKSHOP ON SYSTEM LEVEL INTERCONNECT PREDICTION (SLIP), 2019,
  • [26] A QUANTITATIVE, EXPERIMENTAL APPROACH TO MEASURING PROCESSOR SIDE-CHANNEL SECURITY
    Demme, John
    Martin, Robert
    Waksman, Adam
    Sethumadhavan, Simha
    IEEE MICRO, 2013, 33 (03) : 68 - 77
  • [27] Reactive side-channel countermeasures: Applicability and quantitative security evaluation
    Agosta, Giovanni
    Barenghi, Alessandro
    Pelosi, Gerardo
    Scandale, Michele
    MICROPROCESSORS AND MICROSYSTEMS, 2018, 62 : 50 - 60
  • [28] Exploiting On-chip Power Management for Side-Channel Security
    Singh, Arvind
    Kar, Monodeep
    Mathew, Sanu
    Rajan, Anand
    De, Vivek
    Mukhopadhyay, Saibal
    PROCEEDINGS OF THE 2018 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2018, : 401 - 406
  • [29] Quantitative Evaluation of Side-channel Security for Elliptic Curve Cryptosystems
    Li, Huiyun
    Chen, Tingding
    Wu, Keke
    Yu, Fengqi
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 163 - 166
  • [30] Masking against Side-Channel Attacks: A Formal Security Proof
    Prouff, Emmanuel
    Rivain, Matthieu
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 142 - 159