Cryptology ePrint Archive: Report 2021/1518

Revisiting Mutual Information Analysis: Multidimensionality, Neural Estimation and Optimality Proofs

Valence Cristiani and Maxime Lecomte and Philippe Maurine

Abstract: Recent works showed how Mutual Information Neural Estimation (MINE) could be applied to side-channel analysis in order to evaluate the amount of leakage of an electronic device. One of the main advantages of MINE over classical estimation techniques is to enable the computation between high dimensional traces and a secret,which is relevant for leakage assessment. However, optimally exploiting this information in an attack context in order to retrieve a secret remains a non-trivial task especially when a profiling phase of the target is not allowed. Within this context, the purpose of this paper is to address this problem based on a simple idea: there are multiple leakage sources in side-channel traces and optimal attacks should necessarily exploit most/all of them. To this aim, a new mathematical framework, designed to bridge classical Mutual Information Analysis (MIA) and the multidimensional aspect of neural-based estimators, is proposed. One of the goals is to provide rigorous proofs consolidating the mathematical basis behind MIA, thus alleviating inconsistencies found in the state of the art. This framework allows to derive a new attack called Neural Estimated Mutual Information Analysis (NEMIA). To the best of our knowledge, it is the first unsupervised attack able to benefit from both the power of deep learning techniques and the valuable theoretical properties of MI. Simulations and experiments show that NEMIA outperforms classical side-channel attacks, especially in low-information contexts.

Category / Keywords: foundations / Side-channel analysis; Mutual information; Deep learning; Multidimensionality; MINE

Date: received 16 Nov 2021

Contact author: valencecristiani at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20211120:230005 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]