MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations

被引:0
|
作者
Camurati G. [1 ]
Dell’amico M. [2 ]
Standaert F.-X. [3 ]
机构
[1] ETH Zurich, Zurich
[2] University of Genoa, Genoa
[3] UC Louvain, Louvain
关键词
Key rank estimation; Monte Carlo methods; Side channel attacks;
D O I
10.46586/tches.v2023.i1.277-300
中图分类号
学科分类号
摘要
Key rank estimation provides a measure of the effort that the attacker has to spend bruteforcing the key of a cryptographic algorithm, after having gained some information from a side channel attack. We present MCRank, a novel method for key rank estimation based on Monte Carlo sampling. MCRank provides an unbiased estimate of the rank and a confidence interval. Its bounds rapidly become tight for increasing sample size, with a corresponding linear increase of the execution time. When applied to evaluate an AES-128 implementation, MCRank can be orders of magnitude faster than the state-of-the-art histogram-based enumeration method for comparable bound tightness. It also scales better than previous work for large keys, up to 2048 bytes. Besides its conceptual simplicity and efficiency, MCRank can assess for the first time the security of large keys even if the probability distributions given the side channel leakage are not independent between subkeys, which occurs, for example, when evaluating the leakage security of an AES-256 implementation. © 2022, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:277 / 300
页数:23
相关论文
共 50 条
  • [41] Combined Fault and Side-Channel Attacks on the AES Key Schedule
    Dassance, Francois
    Venelli, Alexandre
    2012 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC), 2012, : 63 - 71
  • [42] Key-dependent side-channel cube attack on CRAFT
    Pang, Kok-An
    Abdul-Latip, Shekh Faisal
    ETRI JOURNAL, 2021, 43 (02) : 344 - 356
  • [43] Side-channel attack against RSA key generation algorithms
    Bauer, Aurélie
    Jaulmes, Eliane
    Lomné, Victor
    Prouff, Emmanuel
    Roche, Thomas
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8731 : 223 - 241
  • [44] Fast Side-Channel Security Evaluation of ECC Implementations Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder
    Azouaoui, Melissa
    Poussier, Romain
    Standaert, Francois-Xavier
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 25 - 42
  • [45] Measuring Security of Symmetric Encryption Schemes Against On-the-Fly Side-Channel Key-Recovery Attacks
    Santoso, Bagus
    Oohama, Yasutada
    Su, Chunhua
    NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 3 - 17
  • [46] The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations
    Picek S.
    Heuser A.
    Jovic A.
    Bhasin S.
    Regazzoni F.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019, 2019 (01): : 209 - 237
  • [47] Side-Channel Leakage Amount Estimation Based on Communication Theory
    Yang, Wei
    Zhang, Hailong
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [48] Side-Channel Analysis for Searchable Encryption System and its Security Evaluation
    Yoshikawa, Masaya
    Ikezaki, Yoshiya
    Nozaki, Yusuke
    2019 22ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (IEEE CSE 2019) AND 17TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (IEEE EUC 2019), 2019, : 465 - 469
  • [49] Side-Channel Analysis for Intelligent and Connected Vehicle Security: A New Perspective
    Xun, Yijie
    Liu, Jiajia
    Zhang, Yanning
    IEEE NETWORK, 2020, 34 (02): : 150 - 157
  • [50] Leveraging Timing Side-Channel Information and Machine Learning for IoT Security
    Sahu, Kratika
    Kshirsagar, Rasika
    Vasudeva, Surbhi
    Alzahrani, Taghreed
    Karimian, Nima
    2021 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2021,