Cryptology ePrint Archive: Report 2016/922

Leakage Characterizing and Detecting Based on Communication Theory

Wei Yang and Yuchen Cao and Ke Ma and Hailong Zhang and Yongbin Zhou and Baofeng Li

Abstract: Evaluating the side-channel attacks (SCAs) resilience of a crypto device is important and necessary. The SCAs-secure evaluation criteria includes the information theoretic metric and the security metric. The former metric measures the leakage amount of a crypto device. It should be independent with the evaluator. However, the current metrics, e.g. mutual information (MI), conditional entropy and perceived information, are related to the leakage model selected by the evaluator. They only reflect the leakage utilization, rather than the real leakage level of a crypto device. In light of this, we analysis the side-channel as a communication channel and develop two objective metrics, the average MI and capacity of the channel, to characterize the real leakage amount and its upper bound of a crypto device through communication theory. Although the channel capacity is a rough estimation of the leakage amount of the device, it can furnish the leakage amount at the worst case scenario the device may leak. We investigate the estimation methods of the two metric in different noise scenes. Besides, a leakage detection method based on consistency check is developed subsequently. The proposed method are capable of finding the Point-Of-Interests (POIs) in leakage traces and introducing few leakage points cannot be used to mount SCAs. The experiments show the effectiveness of the proposed method.

Category / Keywords: Side-Channel Analysis

Date: received 22 Sep 2016, last revised 24 Sep 2016

Contact author: generalyzy at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20160924:215731 (All versions of this report)

Short URL: ia.cr/2016/922

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]