Cryptology ePrint Archive: Report 2008/005

Information Theoretic Evaluation of Side-Channel Resistant Logic Styles

Francois Mace and Francois-Xavier Standaert and Jean-Jacques Quisquater

Abstract: We propose to apply an information theoretic metric to the evaluation of side-channel resistant logic styles. Due to the long design and development time required for the physical evaluation of such hardware countermeasures, our analysis is based on simulations. Although they do not aim to replace the need of actual measurements, we show that simulations can be used as a meaningful first step in the validation chain of a cryptographic product. For illustration purposes, we apply our methodology to gate-level simulations of different logic styles and stress that it allows a significant improvement of the previously considered evaluation methods. In particular, our results allow putting forward the respective strengths and weaknesses of actual countermeasures and determining to which extent they can practically lead to secure implementations (with respect to a noise parameter), if adversaries were provided with simulation-based side-channel traces. Most importantly, the proposed methodology can be straightforwardly adapted to adversaries provided with any other kind of leakage traces (including physical ones).

Category / Keywords: implementation / side-channel attacks, hardware countermeasures

Publication Info: The paper was published in the proceedings of CHES 2007. This ePrint version contains corrected notations in order to comply with the updated notations of the model in: http://eprint.iacr.org/2006/139.

Date: received 2 Jan 2008, last revised 8 Feb 2008

Contact author: fstandae at uclouvain be

Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation

Note: More details are available on: http://www.dice.ucl.ac.be/~fstandae/tsca/

Version: 20080208:112209 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]