A Survey of Side-Channel Leakage Assessment

被引:4
作者
Wang, Yaru [1 ,2 ]
Tang, Ming [1 ,2 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[2] Wuhan Univ, Minist Educ, Key Lab Aerosp Informat Secur & Trusted Comp, Wuhan 430072, Peoples R China
基金
中国国家自然科学基金;
关键词
leakage assessment technology; side channel attack; TVLA; leakage detection; POWER-ANALYSIS; COUNTERMEASURES; ATTACKS;
D O I
10.3390/electronics12163461
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As more threatening side-channel attacks (SCAs) are being proposed, the security of cryptographic products is seriously challenged. This has prompted both academia and industry to evaluate the security of these products. The security assessment is divided into two styles: attacking-style assessment and leakage detection-style assessment. In this paper, we will focus specifically on the leakage detection-style assessment. Firstly, we divide the assessment methods into Test Vector Leakage Assessment (TVLA) and its optimizations and summarize the shortcomings of TVLA. Secondly, we categorize the various optimization schemes for overcoming these shortcomings into three groups: statistical tool optimizations, detection process optimizations, and decision strategy optimizations. We provide concise explanations of the motivations and processes behind each scheme, as well as compare their detection efficiency. Through our work, we conclude that there is no single optimal assessment scheme that can address all shortcomings of TVLA. Finally, we summarize the purposes and conditions of all leakage detection methods and provide a detection strategy for actual leakage detection. Additionally, we discuss the current development trends in leakage detection.
引用
收藏
页数:26
相关论文
共 68 条
[1]  
Agrawal D, 2002, LECT NOTES COMPUT SC, V2523, P29
[2]  
[Anonymous], 2019, FIPS 1403
[3]  
[Anonymous], 2016, ISO/IEC JTC 1/SC 27: ISO/IEC 17825
[4]  
Azouaoui Melissa, 2020, Security Standardisation Research. 6th International Conference, SSR 2020. Proceedings. Lecture Notes in Computer Science (LNCS 12529), P46, DOI 10.1007/978-3-030-64357-7_3
[5]  
Bache F, 2018, DES AUT TEST EUROPE, P1117, DOI 10.23919/DATE.2018.8342178
[6]  
Backes M., 2019, P 19 USENIX SEC S SA
[7]  
Becker G., ICMC 2013, VVolume 1001
[8]   Deep learning for side-channel analysis and introduction to ASCAD database [J].
Benadjila, Ryad ;
Prouff, Emmanuel ;
Strullu, Remi ;
Cagli, Eleonora ;
Dumas, Cecile .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (02) :163-188
[9]  
Bernstein D. J., 2005, CACHE TIMING ATTACKS
[10]  
Biham E., 1991, Journal of Cryptology, V4, P3, DOI 10.1007/BF00630563