A Theoretical Study of Kolmogorov-Smirnov Distinguishers

被引:17
作者
Heuser, Annelie [1 ]
Rioul, Olivier [1 ]
Guilley, Sylvain [1 ]
机构
[1] TELECOM ParisTech, COMELEC, Paris, France
来源
CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN | 2014年 / 8622卷
关键词
Side-channel distinguisher; Confusion coefficient; Kolmogorov-Smirnov analysis; Closed-form expressions; S-Box differential uniformity; Constrained S-Box search; S-BOXES;
D O I
10.1007/978-3-319-10175-0_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we carry out a detailed mathematical study of two theoretical distinguishers based on the Kolmogorov-Smirnov (KS) distance. This includes a proof of soundness and the derivation of closed-form expressions, which can be split into two factors: one depending only on the noise and the other on the confusion coefficient of Fei, Luo and Ding. This allows one to have a deeper understanding of the relative influences of the signal-to-noise ratio and the confusion coefficient on the distinguisher's performance. Moreover, one is able to directly compare distinguishers based on their closed-form expressions instead of using evaluation metric that might obscure the actual performance and favor one distinguisher over the other. Furthermore, we formalize the link between the confusion coefficient and differential cryptanalysis, which shows that the stronger an S-box is resistant to differential attacks the weaker it is against side-channel attacks, and vice versa.
引用
收藏
页码:9 / 28
页数:20
相关论文
共 29 条
[1]  
[Anonymous], 2008, POWER ANAL ATTACKS R
[2]  
Biham E., 1992, CRYPTO 92, V740, P487, DOI 10.1007/3-540-48071-4_34
[3]   Differential properties of power functions [J].
Blondeau, Celine ;
Canteaut, Anne ;
Charpin, Pascale .
2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, :2478-2482
[4]  
Carlet C, 2005, LECT NOTES COMPUT SC, V3797, P49
[5]  
Carlet C., 2010, BOOLEAN MODELS METHO, P398
[6]  
Chabaud F., 1995, Advances in Cryptology - EUROCRYPT '94. Workshop on the Theory and Application of Cryptographic Techniques. Proceedings, P356, DOI 10.1007/BFb0053450
[7]   Univariate side channel attacks and leakage modeling [J].
Doget, Julien ;
Prouff, Emmanuel ;
Rivain, Matthieu ;
Standaert, Francois-Xavier .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (02) :123-144
[8]   A Statistical Model for DPA with Novel Algorithmic Confusion Analysis [J].
Fei, Yunsi ;
Luo, Qiasi ;
Ding, A. Adam .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2012, 2012, 7428 :233-250
[9]  
Guilley S, 2004, INT FED INFO PROC, V153, P127
[10]  
Hui Zhao, 2013, Information Security Practice and Experience. 9th International Conference, ISPEC 2013. Proceedings, P336, DOI 10.1007/978-3-642-38033-4_24