MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations

被引:0
|
作者
Camurati G. [1 ]
Dell’amico M. [2 ]
Standaert F.-X. [3 ]
机构
[1] ETH Zurich, Zurich
[2] University of Genoa, Genoa
[3] UC Louvain, Louvain
关键词
Key rank estimation; Monte Carlo methods; Side channel attacks;
D O I
10.46586/tches.v2023.i1.277-300
中图分类号
学科分类号
摘要
Key rank estimation provides a measure of the effort that the attacker has to spend bruteforcing the key of a cryptographic algorithm, after having gained some information from a side channel attack. We present MCRank, a novel method for key rank estimation based on Monte Carlo sampling. MCRank provides an unbiased estimate of the rank and a confidence interval. Its bounds rapidly become tight for increasing sample size, with a corresponding linear increase of the execution time. When applied to evaluate an AES-128 implementation, MCRank can be orders of magnitude faster than the state-of-the-art histogram-based enumeration method for comparable bound tightness. It also scales better than previous work for large keys, up to 2048 bytes. Besides its conceptual simplicity and efficiency, MCRank can assess for the first time the security of large keys even if the probability distributions given the side channel leakage are not independent between subkeys, which occurs, for example, when evaluating the leakage security of an AES-256 implementation. © 2022, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:277 / 300
页数:23
相关论文
共 50 条
  • [1] Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment
    Glowacz, Cezary
    Grosso, Vincent
    Poussier, Romain
    Schueth, Joachim
    Standaert, Francois-Xavier
    FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 117 - 129
  • [2] Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations
    Martin, Daniel P.
    Mather, Luke
    Oswald, Elisabeth
    Stam, Martijn
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 548 - 572
  • [3] Side-channel security of practical quantum key distribution
    Jiang, Cong
    Hu, Xiao-Long
    Yu, Zong-Wen
    Wang, Xiang-Bin
    PHYSICAL REVIEW RESEARCH, 2024, 6 (01):
  • [4] Side-channel countermeasures’ dissection and the limits of closed source security evaluations
    Bronchain O.
    Standaert F.-X.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (02): : 1 - 25
  • [5] "Rank Correction": A New Side-Channel Approach for Secret Key Recovery
    Nassar, Maxime
    Souissi, Youssef
    Guilley, Sylvain
    Danger, Jean-Luc
    SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 128 - 143
  • [6] Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations
    Bronchain, Olivier
    Hendrickx, Julien M.
    Massart, Clement
    Olshevsky, Alex
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1, 2019, 11692 : 713 - 737
  • [7] Understanding the limitations and improving the relevance of SPICE simulations in side-channel security evaluations
    Kamel, Dina
    Renauld, Mathieu
    Flandre, Denis
    Standaert, Francois-Xavier
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2014, 4 (03) : 187 - 195
  • [8] Quantitative Evaluation of Side-channel Security
    Li, Huiyun
    Chen, Tingding
    Wu, Keke
    Yu, Fengqi
    2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 2, PROCEEDINGS, 2009, : 456 - 460
  • [9] Side-channel security of superscalar CPUs
    Barenghi, Alessandro
    Pelosi, Gerardo
    2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2018,
  • [10] S-box Pooling: Towards More Efficient Side-Channel Security Evaluations
    Zhou, Yuanyuan
    Standaert, Francois-Xavier
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2022, 2022, 13285 : 146 - 164