Cryptology ePrint Archive: Report 2017/992

Leakage Bounds for Gaussian Side Channels

Thomas Unterluggauer and Thomas Korak and Stefan Mangard and Robert Schilling and Luca Benini and Frank Gürkaynak and Michael Muehlberghuber

Abstract: In recent years, many leakage-resilient schemes have been published. These schemes guarantee security against side-channel attacks given bounded leakage of the underlying primitive. However, it is a challenging task to reliably determine these leakage bounds from physical properties. In this work, we present a novel approach to find reliable leakage bounds for side channels of cryptographic implementations when the input data complexity is limited such as in leakage-resilient schemes. By mapping results from communication theory to the side-channel domain, we show that the channel capacity is the natural upper bound for the mutual information (MI) to be learned from multivariate side-channels with Gaussian noise. It shows that this upper bound is determined by the device-specific signal-to-noise ratio (SNR). We further investigate the case when attackers are capable of measuring the same side-channel leakage multiple times and perform signal averaging. Our results here indicate that the gain in the SNR obtained from averaging is exponential in the number of points of interest that are used from the leakage traces. Based on this, we illustrate how the side-channel capacity gives a tool to compute the minimum attack complexity to learn a certain amount of information from side-channel leakage. We then show that our MI bounds match with reality by evaluating the MI in multivariate Gaussian templates built from practical measurements on an ASIC. We finally use our model to show the security of the Keccak-f[400]-based authenticated encryption scheme ISAP on this ASIC against power analysis attacks.

Category / Keywords: implementation / leakage-resilient cryptography, leakage model, mutual information, channel capacity

Original Publication (in the same form): CARDIS 2017

Date: received 9 Oct 2017

Contact author: thomas unterluggauer at iaik tugraz at

Available format(s): PDF | BibTeX Citation

Version: 20171011:153827 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]