Mutual Information Analysis: a Comprehensive Study

被引:184
作者
Batina, Lejla [1 ,2 ,3 ]
Gierlichs, Benedikt [1 ,2 ]
Prouff, Emmanuel [4 ]
Rivain, Matthieu [5 ]
Standaert, Francois-Xavier [6 ]
Veyrat-Charvillon, Nicolas [6 ]
机构
[1] Katholieke Univ Leuven, ESAT SCD COSIC, B-3001 Louvaine La Neuve, Belgium
[2] Katholieke Univ Leuven, IBBT, B-3001 Louvaine La Neuve, Belgium
[3] Radboud Univ Nijmegen, CS Dept, Digital Secur Grp, NL-6525 AJ Nijmegen, Netherlands
[4] Oberthur Technol, F-92726 Nanterre, France
[5] CryptoExperts, Paris, France
[6] Catholic Univ Louvain, UCL Crypto Grp, B-1348 Louvaine La Neuve, Belgium
关键词
Side-Channel Analysis; Mutual Information Analysis; Masking Countermeasure; Higher-Order Attacks; Probability Density Estimation; POWER ANALYSIS; ATTACKS;
D O I
10.1007/s00145-010-9084-8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mutual Information Analysis is a generic side-channel distinguisher that has been introduced at CHES 2008. It aims to allow successful attacks requiring minimum assumptions and knowledge of the target device by the adversary. In this paper, we compile recent contributions and applications of MIA in a comprehensive study. From a theoretical point of view, we carefully discuss its statistical properties and relationship with probability density estimation tools. From a practical point of view, we apply MIA in two of the most investigated contexts for side-channel attacks. Namely, we consider first-order attacks against an unprotected implementation of the DES in a full custom IC and second-order attacks against a masked implementation of the DES in an 8-bit microcontroller. These experiments allow to put forward the strengths and weaknesses of this new distinguisher and to compare it with standard power analysis attacks using the correlation coefficient.
引用
收藏
页码:269 / 291
页数:23
相关论文
共 36 条
  • [1] [Anonymous], HDB STAT
  • [2] [Anonymous], 2001, CRYPTOGRAPHIC HARDWA
  • [3] [Anonymous], 1996, CRYPTO, DOI DOI 10.1007/3-540-68697-5_9
  • [4] [Anonymous], 1999, LNCS
  • [5] AUMONIER S, 2007, P ECRYPT WORKSH TOOL
  • [6] Batina L, 2009, LECT NOTES COMPUT SC, V5747, P112
  • [7] Correlation power analysis with a leakage model
    Brier, E
    Clavier, C
    Olivier, F
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 16 - 29
  • [8] Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
  • [9] Chari S., 1999, LECT NOTES COMPUTER, V1666, P398, DOI [10.1007/3-540-48405-1_26, DOI 10.1007/3-540-48405-1_26]
  • [10] Cover T. M., 1999, Elements of information theory