Theoretical and practical aspects of mutual information-based side channel analysis (Q2430142)

From MaRDI portal
Revision as of 10:00, 30 July 2024 by Openalex240730090724 (talk | contribs) (Set OpenAlex properties.)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
scientific article
Language Label Description Also known as
English
Theoretical and practical aspects of mutual information-based side channel analysis
scientific article

    Statements

    Theoretical and practical aspects of mutual information-based side channel analysis (English)
    0 references
    0 references
    0 references
    5 April 2011
    0 references
    Summary: A large variety of side channel analyses performed on embedded devices involve the linear correlation coefficient as wrong-key distinguisher. This coefficient is actually a sound statistical tool to quantify linear dependencies between univariate variables. At CHES 2008, Gierlichs et al. proposed to use the mutual information measure as an alternative to the correlation coefficient since it detects any kind of statistical dependency. Substituting it for the correlation coefficient may indeed be considered as a natural extension of the existing attacks. Nevertheless, the first published applications have raised several open issues. In this paper, we conduct a theoretical analysis of MIA in the Gaussian leakage model to explore the reasons why and when it is a sound key recovery attack. Also, we generalise MIA to higher-orders (i.e., against masked implementations). Secondly, we address the main practical issue of MIA: the mutual information estimation which itself relies on the estimation of statistical distributions. We describe three classical estimation methods and we apply them in the context of MIA. Eventually, we present various attack simulations and practical attack experiments that allow us to check the efficiency of MIA in practice and to compare it to classical correlation-based attacks.
    0 references
    applied cryptography
    0 references
    embedded security
    0 references
    side channel analysis
    0 references
    SCA
    0 references
    mutual information analysis
    0 references
    MIA
    0 references
    density estimation
    0 references
    Gaussian leakage model
    0 references
    key recovery attacks
    0 references
    attack simulation
    0 references
    correlation-based attacks
    0 references

    Identifiers