Back to Search Start Over

Best Information is Most Successful

Authors :
Sylvain Guilley
Eloi de Chérisey
Pablo Piantanida
Olivier Rioul
Secure and Safe Hardware (SSH)
Laboratoire Traitement et Communication de l'Information (LTCI)
Institut Mines-Télécom [Paris] (IMT)-Télécom Paris-Institut Mines-Télécom [Paris] (IMT)-Télécom Paris
Département Communications & Electronique (COMELEC)
Télécom ParisTech
Communications Numériques (COMNUM)
Laboratoire des signaux et systèmes (L2S)
Université Paris-Sud - Paris 11 (UP11)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)
Source :
IACR Transactions on Cryptographic Hardware and Embedded Systems, IACR Transactions on Cryptographic Hardware and Embedded Systems, IACR, 2019, 2019 (2), pp.49-79. ⟨10.13154/tches.v2019.i2.49-79⟩
Publication Year :
2019
Publisher :
Universitatsbibliothek der Ruhr-Universitat Bochum, 2019.

Abstract

Using information-theoretic tools, this paper establishes a mathematical link between the probability of success of a side-channel attack and the minimum number of queries to reach a given success rate, valid for any possible distinguishing rule and with the best possible knowledge on the attacker’s side. This link is a lower bound on the number of queries highly depends on Shannon’s mutual information between the traces and the secret key. This leads us to derive upper bounds on the mutual information that are as tight as possible and can be easily calculated. It turns out that, in the case of an additive white Gaussian noise, the bound on the probability of success of any attack is directly related to the signal to noise ratio. This leads to very easy computations and predictions of the success rate in any leakage model.

Details

ISSN :
25692925
Database :
OpenAIRE
Journal :
IACR Transactions on Cryptographic Hardware and Embedded Systems
Accession number :
edsair.doi.dedup.....9cef869fce2a20fea855c3189099089b
Full Text :
https://doi.org/10.46586/tches.v2019.i2.49-79