Chapter

Advances in Cryptology - EUROCRYPT 2009

Volume 5479 of the series Lecture Notes in Computer Science pp 443-461

A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks

  • François-Xavier StandaertAffiliated withUCL Crypto Group, Université catholique de Louvain
  • , Tal G. MalkinAffiliated withDept. of Computer Science, Columbia University
  • , Moti YungAffiliated withDept. of Computer Science, Columbia UniversityGoogle Inc.

Abstract

The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this challenge, this work makes a step in this direction and proposes a framework for the analysis of cryptographic implementations that includes a theoretical model and an application methodology. The model is based on commonly accepted hypotheses about side-channels that computations give rise to. It allows quantifying the effect of practically relevant leakage functions with a combination of information theoretic and security metrics, measuring the quality of an implementation and the strength of an adversary, respectively. From a theoretical point of view, we demonstrate formal connections between these metrics and discuss their intuitive meaning. From a practical point of view, the model implies a unified methodology for the analysis of side-channel key recovery attacks. The proposed solution allows getting rid of most of the subjective parameters that were limiting previous specialized and often ad hoc approaches in the evaluation of physically observable devices. It typically determines the extent to which basic (but practically essential) questions such as “How to compare two implementations?” or “How to compare two side-channel adversaries?” can be answered in a sound fashion.