Information Bounds and Convergence Rates for Side-Channel Security Evaluators

被引:0
|
作者
Masure L. [1 ]
Cassiers G. [2 ]
Hendrickx J. [1 ]
Standaert F.-X. [1 ]
机构
[1] UCLouvain, ICTEAM, Crypto Group, Louvain-la-Neuve
[2] TU Graz, Graz
基金
欧洲研究理事会;
关键词
Perceived Information; Profiled Attacks; Training Information;
D O I
10.46586/tches.v2023.i3.522-569
中图分类号
学科分类号
摘要
Current side-channel evaluation methodologies exhibit a gap between inefficient tools offering strong theoretical guarantees and efficient tools only offering heuristic (sometimes case-specific) guarantees. Profiled attacks based on the empirical leakage distribution correspond to the first category. Bronchain et al. showed at Crypto 2019 that they allow bounding the worst-case security level of an implementation, but the bounds become loose as the leakage dimensionality increases. Template attacks and machine learning models are examples of the second category. In view of the increasing popularity of such parametric tools in the literature, a natural question is whether the information they can extract can be bounded. In this paper, we first show that a metric conjectured to be useful for this purpose, the hypothetical information, does not offer such a general bound. It only does when the assumptions exploited by a parametric model match the true leakage distribution. We therefore introduce a new metric, the training information, that provides the guarantees that were conjectured for the hypothetical information for practically-relevant models. We next initiate a study of the convergence rates of profiled side-channel distinguishers which clarifies, to the best of our knowledge for the first time, the parameters that influence the complexity of a profiling. On the one hand, the latter has practical consequences for evaluators as it can guide them in choosing the appropriate modeling tool depending on the implementation (e.g., protected or not) and contexts (e.g., granting them access to the countermeasures’ randomness or not). It also allows anticipating the amount of measurements needed to guarantee a sufficient model quality. On the other hand, our results connect and exhibit differences between side-channel analysis and statistical learning theory. © 2023, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:522 / 569
页数:47
相关论文
共 50 条
  • [31] Measurement of Side-Channel Information from Cryptographic Devices on Security Evaluation Platform: Demonstration of SPACES Project
    Endo, Sho
    Hayashi, Yu-ichi
    Homma, Naofumi
    Aoki, Takafumi
    Katashita, Toshihiro
    Hori, Yohei
    Sakiyama, Kazuo
    Nagata, Makoto
    Danger, Jean-Luc
    Le, Thanh-Ha
    Sabet, Pirouz Bazargan
    2012 PROCEEDINGS OF SICE ANNUAL CONFERENCE (SICE), 2012, : 313 - 316
  • [32] Fast Side-Channel Security Evaluation of ECC Implementations Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder
    Azouaoui, Melissa
    Poussier, Romain
    Standaert, Francois-Xavier
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 25 - 42
  • [33] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [34] Attacking OpenSSL ECDSA with a small amount of side-channel information
    Wang, Wenbo
    Fan, Shuqin
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (03)
  • [35] Side-Channel Information Leakage of Traffic Data in Instant Messaging
    Li, Ke
    Li, Hong
    Zhu, Hongsong
    Sun, Limin
    Wen, Hui
    2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2019,
  • [36] Electromagnetic Information Leakage for Side-Channel Analysis of Cryptographic Modules
    Homma, Naofumi
    Aoki, Takafumi
    Satoh, Akashi
    2010 IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC 2010), 2010, : 97 - 102
  • [37] Preprocessing of the Physical Leakage Information to Combine Side-Channel Distinguishers
    Seckiner, Soner
    Kose, Selcuk
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2021, 29 (12) : 2052 - 2063
  • [38] A Method for Identifying eHealth Applications using Side-Channel Information
    Vergutz, Andressa
    Medeiros, Iago
    Rosario, Denis
    Cerqueira, Eduardo
    Santos, Aldri
    Nogueira, Michele
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [39] Side-channel Vulnerability Factor: A Metric for Measuring Information Leakage
    Demme, John
    Martin, Robert
    Waksman, Adam
    Sethumadhavan, Simha
    2012 39TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA), 2012, : 106 - 117
  • [40] Side-Channel Analysis for Searchable Encryption System and its Security Evaluation
    Yoshikawa, Masaya
    Ikezaki, Yoshiya
    Nozaki, Yusuke
    2019 22ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (IEEE CSE 2019) AND 17TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (IEEE EUC 2019), 2019, : 465 - 469