Strong Converse Theorem for Source Encryption under Side-Channel Attacks

01/27/2022
by   Yasutada Oohama, et al.
0

We are interested in investigating the security of source encryption with a symmetric key under side-channel attacks. In this paper, we propose a general framework of source encryption with a symmetric key under the side-channel attacks, which applies to any source encryption with a symmetric key and any kind of side-channel attacks targeting the secret key. We also propose a new security criterion for strong secrecy under side-channel attacks, which is a natural extension of mutual information, i.e., the maximum conditional mutual information between the plaintext and the ciphertext given the adversarial key leakage, where the maximum is taken over all possible plaintext distribution. Under this new criterion, we successfully formulate the rate region, which serves as both necessary and sufficient conditions to have secure transmission even under side-channel attacks. Furthermore, we also prove another theoretical result on our new security criterion, which might be interesting in its own right: in the case of the discrete memoryless source, no perfect secrecy under side-channel attacks in the standard security criterion, i.e., the ordinary mutual information, is achievable without achieving perfect secrecy in this new security criterion, although our new security criterion is more strict than the standard security criterion.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/12/2021

Distributed Source Coding with Encryption Using Correlated Keys

We pose and investigate the distributed secure source coding based on th...
research
01/24/2018

On the Gold Standard for Security of Universal Steganography

While symmetric-key steganography is quite well understood both in the i...
research
07/31/2022

Secure Email Transmission Protocols – A New Architecture Design

During today's digital age, emails have become a crucial part of communi...
research
08/30/2021

Secure Block Source Coding with Sequential Encoding

We introduce fundamental bounds on achievable cumulative rate distributi...
research
05/10/2023

Secure Block Joint Source-Channel Coding with Sequential Encoding

We extend the results of Ghourchian et al. [IEEE JSAIT-2021], to joint s...
research
01/08/2018

Information Theoretic Security for Side-Channel Attacks to the Shannon Cipher System

We study side-channel attacks for the Shannon cipher system. To pose sid...
research
08/27/2021

Dimming Down LED: An Open-source Threshold Implementation on Light Encryption Device (LED) Block Cipher

Lightweight block ciphers have been widely used in applications such as ...

Please sign up or login with your details

Forgot password? Click here to reset