Information Bounds and Convergence Rates for Side-Channel Security Evaluators

被引:0
|
作者
Masure L. [1 ]
Cassiers G. [2 ]
Hendrickx J. [1 ]
Standaert F.-X. [1 ]
机构
[1] UCLouvain, ICTEAM, Crypto Group, Louvain-la-Neuve
[2] TU Graz, Graz
基金
欧洲研究理事会;
关键词
Perceived Information; Profiled Attacks; Training Information;
D O I
10.46586/tches.v2023.i3.522-569
中图分类号
学科分类号
摘要
Current side-channel evaluation methodologies exhibit a gap between inefficient tools offering strong theoretical guarantees and efficient tools only offering heuristic (sometimes case-specific) guarantees. Profiled attacks based on the empirical leakage distribution correspond to the first category. Bronchain et al. showed at Crypto 2019 that they allow bounding the worst-case security level of an implementation, but the bounds become loose as the leakage dimensionality increases. Template attacks and machine learning models are examples of the second category. In view of the increasing popularity of such parametric tools in the literature, a natural question is whether the information they can extract can be bounded. In this paper, we first show that a metric conjectured to be useful for this purpose, the hypothetical information, does not offer such a general bound. It only does when the assumptions exploited by a parametric model match the true leakage distribution. We therefore introduce a new metric, the training information, that provides the guarantees that were conjectured for the hypothetical information for practically-relevant models. We next initiate a study of the convergence rates of profiled side-channel distinguishers which clarifies, to the best of our knowledge for the first time, the parameters that influence the complexity of a profiling. On the one hand, the latter has practical consequences for evaluators as it can guide them in choosing the appropriate modeling tool depending on the implementation (e.g., protected or not) and contexts (e.g., granting them access to the countermeasures’ randomness or not). It also allows anticipating the amount of measurements needed to guarantee a sufficient model quality. On the other hand, our results connect and exhibit differences between side-channel analysis and statistical learning theory. © 2023, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:522 / 569
页数:47
相关论文
共 50 条
  • [41] Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment
    Glowacz, Cezary
    Grosso, Vincent
    Poussier, Romain
    Schueth, Joachim
    Standaert, Francois-Xavier
    FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 117 - 129
  • [42] Leveraging EM Side-Channel Information to Detect Rowhammer Attacks
    Zhang, Zhenkai
    Zhan, Zihao
    Balasubramanian, Daniel
    Li, Bo
    Volgyesi, Peter
    Koutsoukos, Xenofon
    2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 729 - 746
  • [43] Attacking OpenSSL ECDSA with a small amount of side-channel information
    Wenbo Wang
    Shuqin Fan
    Science China Information Sciences, 2018, 61
  • [44] Information theoretic evaluation of side-channel resistant logic styles
    Mace, Francois
    Standaert, Francois-Xavier
    Quisquater, Jean-Jacques
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2007, PROCEEDINGS, 2007, 4727 : 427 - +
  • [45] An Information-Theoretic Model for Adaptive Side-Channel Attacks
    Koepf, Boris
    Basin, David
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 286 - 296
  • [46] Side-Channel Analysis for Intelligent and Connected Vehicle Security: A New Perspective
    Xun, Yijie
    Liu, Jiajia
    Zhang, Yanning
    IEEE NETWORK, 2020, 34 (02): : 150 - 157
  • [47] CacheGuard: A Behavior Model Checker for Cache Timing Side-Channel Security
    Xu, Zihan
    Yin, Lingfeng
    Lyu, Yongqiang
    Wang, Haixia
    Qu, Gang
    Wang, Dongsheng
    27TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC 2022, 2022, : 19 - 24
  • [48] Towards security limits in side-channel attacks (with an application to block ciphers)
    Standaert, F. -X.
    Peeters, E.
    Archambeau, C.
    Quisquater, J. -J.
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 30 - 45
  • [49] Side-Channel Propagation Measurements and Modeling for Hardware Security in IoT Devices
    Sangodoyin, Seun
    Werner, Frank T.
    Yilmaz, Baki B.
    Cheng, Chia-Lin
    Ugurlu, Elvan M.
    Sehatbakhsh, Nader
    Prvulovic, Milos
    Zajic, Alenka
    IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, 2021, 69 (06) : 3470 - 3484
  • [50] Cyber-Security Threats and Side-Channel Attacks for Digital Agriculture
    Alahmadi, Adel N.
    Rehman, Saeed Ur
    Alhazmi, Husain S.
    Glynn, David G.
    Shoaib, Hatoon
    Sole, Patrick
    SENSORS, 2022, 22 (09)