Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds

05/16/2021
by   Wei Cheng, et al.
0

Measuring the information leakage is critical for evaluating practical security of cryptographic devices against side-channel analysis. More straightforwardly, it is interesting to have an upper bound on success rate of any attack given a (fixed) number of side-channel measurements. Or conversely, we wish to derive a lower bound on the number of queries for a given success rate of optimal attacks. In this paper, we derive several bounds in both directions by using information-theoretic tools, particularly for cryptographic implementations protected by masking schemes. We show that a generic upper bound on the probability of success, irrespective to specific attacks, is linked to mutual information between side-channel measurements and the secret. Moreover, our numerical evaluation confirms that, the success rate of optimal maximum likelihood distinguishers is tightly bounded given a fixed number of measurements.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/04/2018

A Tight Upper Bound on Mutual Information

We derive a tight lower bound on equivocation (conditional entropy), or ...
research
05/10/2021

Rate-Distortion Analysis of Minimum Excess Risk in Bayesian Learning

Minimum Excess Risk (MER) in Bayesian learning is defined as the differe...
research
02/23/2022

Minimax Optimal Quantization of Linear Models: Information-Theoretic Limits and Efficient Algorithms

We consider the problem of quantizing a linear model learned from measur...
research
04/30/2021

InfoNEAT: Information Theory-based NeuroEvolution of Augmenting Topologies for Side-channel Analysis

Profiled side-channel analysis (SCA) leverages leakage from cryptographi...
research
05/10/2023

Maximal Leakage of Masked Implementations Using Mrs. Gerber's Lemma for Min-Entropy

A common countermeasure against side-channel attacks on secret key crypt...
research
11/18/2018

Information Theoretic Bounds on Optimal Worst-case Error in Binary Mixture Identification

Identification of latent binary sequences from a pool of noisy observati...
research
06/12/2023

Generic Attacks against Cryptographic Hardware through Long-Range Deep Learning

Hardware-based cryptographic implementations utilize countermeasures to ...

Please sign up or login with your details

Forgot password? Click here to reset