An information-theoretic model for side-channel attacks in embedded hardware
Abstract
Using information-theoretic tools, this paper estab- lishes a mathematical link between the probability of success of a side-channel attack and the minimum number of queries to reach a given success rate, valid for any possible distinguishing rule and with the best possible knowledge on the attacker’s side. This link is a lower bound on the number of queries, which depends on the mutual information between the traces and the secret key. This leads us to derive upper bounds on the mutual information that are as tight as possible and can be easily calculated. It turns out that, in the case of additive white Gaussian noise, the bound on the probability of success of any attack is directly related to the signal-to-noise ratio (SNR). This leads to easy computations and predictions of the success rate for any leakage model.
Domains
Mathematics [math] Information Theory [math.IT] Computer Science [cs] Information Theory [cs.IT] Computer Science [cs] Cryptography and Security [cs.CR] Computer Science [cs] Signal and Image Processing Mathematics [math] Classical Analysis and ODEs [math.CA] Mathematics [math] General Mathematics [math.GM] Computer Science [cs] Discrete Mathematics [cs.DM] Mathematics [math] Statistics [math.ST] Mathematics [math] Probability [math.PR] Mathematics [math] Functional Analysis [math.FA]
Origin : Files produced by the author(s)