Leakage Assessment Through Neural Estimation of the Mutual Information

被引:10
作者
Cristiani, Valence [1 ]
Lecomte, Maxime [1 ]
Maurine, Philippe [2 ]
机构
[1] Univ Grenoble Alpes, CEA, LETI, Grenoble, France
[2] LIRMM, Montpellier, France
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020 | 2020年 / 12418卷
关键词
Side channel analysis; Mutual information; Deep learning;
D O I
10.1007/978-3-030-61638-0_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A large variety of side-channel attacks have been developed to extract secrets from electronic devices through their physical leakages. Whatever the utilized strategy, the amount of information one could gain from a side-channel trace is always bounded by the Mutual Information (MI) between the secret and the trace. This makes it, all punning aside, a key quantity for leakage evaluation. Unfortunately, traces are usually of too high dimension for existing statistical estimators to stay sound when computing the MI over full traces. However, recent works from the machine learning community have shown that it is possible to evaluate the MI in high dimensional space thanks to newest deep learning techniques. This paper explores how this new estimator could impact the side channel domain. It presents an analysis which aim is to derive the best way of using this estimator in practice. Then, it shows how such a tool can be used to assess the leakage of any device.
引用
收藏
页码:144 / 162
页数:19
相关论文
共 22 条
[1]  
Belghazi MI, 2018, PR MACH LEARN RES, V80
[2]  
Benadjila R., 2018, Study of deep learning techniques for side-channel analysis and introduction to ASCAD database
[3]  
Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
[4]   A Bit-Level Approach to Side Channel Based Disassembling [J].
Cristiani, Valence ;
Lecomte, Maxime ;
Hiscock, Thomas .
SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2019, 2020, 11833 :143-158
[5]   Building a side channel based disassembler [J].
Eisenbarth T. ;
Paar C. ;
Weghenkel B. .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010, 6340 (PART 1) :78-99
[6]  
Goldack M., 2008, Master's thesis
[7]  
Joye M., 2004, LNCS, V3156, DOI [10.1007/b99451, DOI 10.1007/B99451]
[8]  
Kingma DP, 2014, ADV NEUR IN, V27
[9]  
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
[10]  
Kraskov A, 2004, PHYS REV E, V69, DOI 10.1103/PhysRevE.69.066138