Improved Alpha-Information Bounds for Higher-Order Masked Cryptographic Implementations

被引:2
|
作者
Liu, Yi [1 ]
Beguinot, Julien [1 ]
Cheng, Wei [1 ,2 ]
Guilley, Sylvain [1 ,2 ]
Masure, Loic [3 ]
Rioul, Olivier [1 ]
Standaert, Francois-Xavier [3 ]
机构
[1] Inst Polytech Paris, LTCI, Telecom Paris, F-91120 Palaiseau, France
[2] Secure IC SAS, F-75014 Paris, France
[3] Catholic Univ Louvain, ICTEAM Inst, Louvain, Belgium
来源
2023 IEEE INFORMATION THEORY WORKSHOP, ITW | 2023年
关键词
RENYI;
D O I
10.1109/ITW55543.2023.10161608
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Embedded cryptographic devices are usually protected against side-channel attacks by masking strategies. In this paper, the security of protected cryptographic implementations is evaluated for any masking order, using alpha-information measures. Universal upper bounds on the probability of success of any type of side-channel attack are derived. These also provide lower bounds on the minimum number of queries required to achieve a given success rate. An important issue, solved in this paper, is to remove the loss factor due to the masking field size.
引用
收藏
页码:81 / 86
页数:6
相关论文
共 50 条
  • [31] INFORMATION AMOUNT AND HIGHER-ORDER EFFICIENCY IN ESTIMATION
    HOSOYA, Y
    ANNALS OF THE INSTITUTE OF STATISTICAL MATHEMATICS, 1990, 42 (01) : 37 - 49
  • [32] HIGHER-ORDER NUMERICAL DIFFERENTIATION OF EXPERIMENTAL INFORMATION
    ROWLANDS, RE
    LIBER, T
    DANIEL, IM
    ROSE, PG
    EXPERIMENTAL MECHANICS, 1973, 13 (03) : 105 - 112
  • [33] Understanding Higher-Order Interactions in Information Space
    Edelsbrunner, Herbert
    Oelsboeck, Katharina
    Wagner, Hubert
    ENTROPY, 2024, 26 (08)
  • [34] Statistical inference using higher-order information
    Anh, V. V.
    Leonenko, N. N.
    Sakhno, L. M.
    JOURNAL OF MULTIVARIATE ANALYSIS, 2007, 98 (04) : 706 - 742
  • [35] HIGHER-ORDER ESCAPE ANALYSIS - OPTIMIZING STACK ALLOCATION IN FUNCTIONAL PROGRAM IMPLEMENTATIONS
    GOLDBERG, B
    PARK, YG
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 432 : 152 - 160
  • [36] Revisiting Higher-order Computational Attacks against White-box Implementations
    Maghrebi, Houssem
    Alessio, Davide
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 265 - 272
  • [37] PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations
    Kim, Hangi
    Jeon, Yongjin
    Kim, Giyoon
    Kim, Jongsung
    Sim, Bo-Yeon
    Han, Dong-Guk
    Seo, Hwajeong
    Kim, Seonggyeom
    Hong, Seokhie
    Sung, Jaechul
    Hong, Deukjo
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2020, 2021, 12593 : 99 - 122
  • [38] Improved quantum computing with higher-order Trotter decomposition
    Yang, Xiaodong
    Nie, Xinfang
    Ji, Yunlan
    Xin, Tao
    Lu, Dawei
    Li, Jun
    PHYSICAL REVIEW A, 2022, 106 (04)
  • [39] Improved higher-order Sobolev inequalities on CR sphere
    Yan, Zetian
    JOURNAL OF FUNCTIONAL ANALYSIS, 2023, 284 (10)
  • [40] AN IMPROVED TECHNIQUE FOR DETERMINING HIGHER-ORDER EIGENVECTOR COEFFICIENTS
    CARPENTER, WC
    BYERS, C
    INTERNATIONAL JOURNAL OF FRACTURE, 1988, 37 (02) : 107 - 121