Codes for Side-Channel Attacks and Protections

被引:7
作者
Guilley, Sylvain [1 ,2 ]
Heuser, Annelie [3 ]
Rioul, Olivier [2 ]
机构
[1] Secure IC SAS, 15 Rue Claude Chappe,Bat B, F-35510 Cesson Sevigne, France
[2] Univ Paris Saclay, Telecom ParisTech, LTCI, F-75013 Paris, France
[3] IRISA, 263 Ave Gen Leclerc, F-35000 Rennes, France
来源
CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017 | 2017年 / 10194卷
关键词
PRIVATE CIRCUITS; LEAKAGE; HARDWARE; SECURE; AES; MASKING;
D O I
10.1007/978-3-319-55589-8_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article revisits side-channel analysis from the standpoint of coding theory. On the one hand, the attacker is shown to apply an optimal decoding algorithm in order to recover the secret key from the analysis of the side-channel. On the other hand, the side-channel protections are presented as a coding problem where the information is mixed with randomness to weaken as much as possible the sensitive information leaked into the side-channel. Therefore, the field of side-channel analysis is viewed as a struggle between a coder and a decoder. In this paper, we focus on the main results obtained through this analysis. In terms of attacks, we discuss optimal strategy in various practical contexts, such as type of noise, dimensionality of the leakage and of the model, etc. Regarding countermeasures, we give a formal analysis of some masking schemes, including enhancements based on codes contributed via fruitful collaborations with Claude Carlet.
引用
收藏
页码:35 / 55
页数:21
相关论文
共 40 条
[1]  
[Anonymous], 2001, FIPS PUB
[2]  
Blömer J, 2005, LECT NOTES COMPUT SC, V3357, P69
[3]   Correlation power analysis with a leakage model [J].
Brier, E ;
Clavier, C ;
Olivier, F .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 :16-29
[4]  
Bringer J., 2014, 2014665 CRYPT EPRINT
[5]  
Bringer J, 2014, LECT NOTES COMPUT SC, V8501, P40, DOI 10.1007/978-3-662-43826-8_4
[6]  
Bruneau N., 2016, IEEE T INFORM FORENS
[7]  
Bruneau N., 2016, J CRYPT ENG IN PRESS
[8]   Less is More Dimensionality Reduction from a Theoretical Perspective [J].
Bruneau, Nicolas ;
Guilley, Sylvain ;
Heuser, Annelie ;
Marion, Damien ;
Rioul, Olivier .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 :22-41
[9]  
Bruneau N, 2014, LECT NOTES COMPUT SC, V8874, P344, DOI 10.1007/978-3-662-45608-8_19
[10]  
Carlet C., 2014, SIDE CHANNEL INDISTI