Theoretical and practical aspects of mutual information-based side channel analysis (Q2430142)
From MaRDI portal
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Theoretical and practical aspects of mutual information-based side channel analysis |
scientific article |
Statements
Theoretical and practical aspects of mutual information-based side channel analysis (English)
0 references
5 April 2011
0 references
Summary: A large variety of side channel analyses performed on embedded devices involve the linear correlation coefficient as wrong-key distinguisher. This coefficient is actually a sound statistical tool to quantify linear dependencies between univariate variables. At CHES 2008, Gierlichs et al. proposed to use the mutual information measure as an alternative to the correlation coefficient since it detects any kind of statistical dependency. Substituting it for the correlation coefficient may indeed be considered as a natural extension of the existing attacks. Nevertheless, the first published applications have raised several open issues. In this paper, we conduct a theoretical analysis of MIA in the Gaussian leakage model to explore the reasons why and when it is a sound key recovery attack. Also, we generalise MIA to higher-orders (i.e., against masked implementations). Secondly, we address the main practical issue of MIA: the mutual information estimation which itself relies on the estimation of statistical distributions. We describe three classical estimation methods and we apply them in the context of MIA. Eventually, we present various attack simulations and practical attack experiments that allow us to check the efficiency of MIA in practice and to compare it to classical correlation-based attacks.
0 references
applied cryptography
0 references
embedded security
0 references
side channel analysis
0 references
SCA
0 references
mutual information analysis
0 references
MIA
0 references
density estimation
0 references
Gaussian leakage model
0 references
key recovery attacks
0 references
attack simulation
0 references
correlation-based attacks
0 references