Paper 2022/253
The Side-Channel Metrics Cheat Sheet
Abstract
Side-channel attacks exploit a physical observable originating from a cryptographic device in order to extract its secrets. Many practically relevant advances in the field of side-channel analysis relate to security evaluations of cryptographic functions and devices. Accordingly, many metrics have been adopted or defined to express and quantify side-channel security. These metrics can relate to one another, but also conflict in terms of effectiveness, assumptions and security goals. In this work, we review the most commonly used metrics in the field of side-channel analysis. We provide a self-contained presentation of each metric, along with a discussion of its limitations. We practically demonstrate the metrics on examples of relevant implementations of the Advanced Encryption Standard (AES), and make the software implementation of the presented metrics available to the community as open source. This work, being beyond a survey of the current status of metrics, will allow researchers and practitioners to produce a well-informed security evaluation through a better understanding of its supporting and summarizing metrics.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Published elsewhere. ACM Computing Surveys
- DOI
- 10.1145/3565571
- Keywords
- Side-Channel AttacksSide-Channel Analysis MetricsInformation Theoretic Metrics
- Contact author(s)
- kostaspap88 @ gmail com
- History
- 2023-04-13: revised
- 2022-03-02: received
- See all versions
- Short URL
- https://ia.cr/2022/253
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2022/253, author = {Kostas Papagiannopoulos and Ognjen Glamocanin and Melissa Azouaoui and Dorian Ros and Francesco Regazzoni and Mirjana Stojilovic}, title = {The Side-Channel Metrics Cheat Sheet}, howpublished = {Cryptology {ePrint} Archive, Paper 2022/253}, year = {2022}, doi = {10.1145/3565571}, url = {https://eprint.iacr.org/2022/253} }