A Comparison of χ2-Test and Mutual Information as Distinguisher for Side-Channel Analysis

被引:1
|
作者
Richter, Bastian [1 ]
Knichel, David [1 ]
Moradi, Amir [1 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst, Bochum, Germany
关键词
Chi squared test; Mutual information analysis; Side-channel attacks; POWER ANALYSIS;
D O I
10.1007/978-3-030-42068-0_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Masking is known as the most widely studied countermeasure against side-channel analysis attacks. Since a masked implementation is based on a certain number of shares (referred to as the order of masking), it still exhibits leakages at higher orders. In order to exploit such leakages, higher-order statistical moments individually at each order need to be estimated reflecting the higher-order attacks. Instead, Mutual Information Analysis (MIA) known for more than 10 years avoids such a moment-based analysis by considering the entire distribution for the key recovery. Recently the chi(2) -test has been proposed for leakage detection and as a distinguisher where also the whole distribution of the leakages is analyzed. In this work, we compare these two schemes to examine their dependency. Indeed, one of the goals of this research is to conclude whether one can outperform the other. In addition to a theoretical comparison, we present two case studies and their corresponding practical evaluations. Both case studies are masked hardware implementations; one is an FPGA-based realization of a threshold implementation of PRESENT, and the other is an AES implementation as a coprocessor on a commercial smart card.
引用
收藏
页码:237 / 251
页数:15
相关论文
共 50 条
  • [21] A Monitoring Framework for Side-Channel Information Leaks
    Lescisin, Michael
    Mahmoud, Qusay H.
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2020, : 690 - 695
  • [22] Leveraging Side-Channel Information for Disassembly and Security
    Park, Jungmin
    Rahman, Fahim
    Vassilev, Apostol T.
    Forte, Domenic
    Tehranipoor, Mark
    [J]. ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2020, 16 (01)
  • [23] Physical Authentication Using Side-Channel Information
    Sakiyama, Kazuo
    Kasuya, Momoka
    Machida, Takanori
    Matsubara, Arisa
    Kuai, Yunfeng
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Miura, Noriyuki
    Nagata, Makoto
    [J]. 2016 4TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2016,
  • [24] Simulation models for side-channel information leaks
    Tiri, K
    Verbauwhede, I
    [J]. 42ND DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 2005, 2005, : 228 - 233
  • [25] Side-channel information leakage analysis and countermeasures in an embedded CPU microarchitecture
    Chen, Qi
    Zhao, Dongyan
    Liu, Liang
    Yan, Xuesong
    Yuan, Yidong
    Zhang, Xige
    Wu, Hongmei
    Wang, Zhe
    [J]. COMPUTER STANDARDS & INTERFACES, 2022, 80
  • [26] Information Theoretical Analysis of Side-Channel Attacks to the Shannon Cipher System
    Oohama, Yasutada
    Santoso, Bagus
    [J]. 2018 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2018, : 581 - 585
  • [27] Information component of national security and its relevant to side-channel analysis
    Martynyuk, V
    Vasyltsov, I
    [J]. MODERN PROBLEMS OF RADIO ENGINEERING, TELECOMMUNICATIONS AND COMPUTER SCIENCE, PROCEEDINGS, 2004, : 298 - 298
  • [28] On Conditional Alpha-Information and its Application to Side-Channel Analysis
    Liu, Yi
    Cheng, Wei
    Guilley, Sylvain
    Rioul, Olivier
    [J]. 2021 IEEE INFORMATION THEORY WORKSHOP (ITW), 2021,
  • [29] First Principal Components Analysis: A New Side Channel Distinguisher
    Souissi, Youssef
    Nassar, Maxime
    Guilley, Sylvain
    Danger, Jean-Luc
    Flament, Florent
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 2011, 6829 : 407 - 419
  • [30] Federated Learning in Side-Channel Analysis
    Wang, Huanyu
    Dubrova, Elena
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2020, 2021, 12593 : 257 - 272