You are looking at a specific version 20130525:133515 of this paper. See the latest version.

Paper 2013/298

A Comparison of Statistical Techniques for Detecting Side-Channel Information Leakage in Cryptographic Devices

Luke Mather and Elisabeth Oswald and Joe Bandenburg and Marcin Wójcik

Abstract

The development of a standardised testing methodology for side-channel resistance of cryptographic devices is an issue that has received recent focus from standardisation bodies such as NIST. Statistical techniques such as hypothesis and significance testing appear to be ideally suited for this purpose. In this work we evaluate the candidacy of three such tests: a \emph{t}-test proposed by Cryptography Research Inc., and two mutual information-based tests. We compare the detection tests in a theoretical setting by conducting an \emph{a priori} statistical power analysis, covering previously unforeseen problems arising from multiple hypothesis testing, and analyse the practical application of the tests through a case study using an implementation of the AES on an ARM7 microcontroller, demonstrating a trade-off between test genericity and data and computational complexity.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Unknown where it was published
Keywords
Side-channel analysisleakage detectionstatisticsmutual information
Contact author(s)
luke mather @ bristol ac uk
elisabeth oswald @ bristol ac uk
joe @ bandenburg com
History
2013-12-18: last of 2 revisions
2013-05-25: received
See all versions
Short URL
https://ia.cr/2013/298
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.