Advances in Cryptology - EUROCRYPT 2009
Volume 5479 of the series Lecture Notes in Computer Science pp 443-461
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- François-Xavier StandaertAffiliated withUCL Crypto Group, Université catholique de Louvain
- , Tal G. MalkinAffiliated withDept. of Computer Science, Columbia University
- , Moti YungAffiliated withDept. of Computer Science, Columbia UniversityGoogle Inc.
Abstract
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this challenge, this work makes a step in this direction and proposes a framework for the analysis of cryptographic implementations that includes a theoretical model and an application methodology. The model is based on commonly accepted hypotheses about side-channels that computations give rise to. It allows quantifying the effect of practically relevant leakage functions with a combination of information theoretic and security metrics, measuring the quality of an implementation and the strength of an adversary, respectively. From a theoretical point of view, we demonstrate formal connections between these metrics and discuss their intuitive meaning. From a practical point of view, the model implies a unified methodology for the analysis of side-channel key recovery attacks. The proposed solution allows getting rid of most of the subjective parameters that were limiting previous specialized and often ad hoc approaches in the evaluation of physically observable devices. It typically determines the extent to which basic (but practically essential) questions such as “How to compare two implementations?” or “How to compare two side-channel adversaries?” can be answered in a sound fashion.
- Title
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Book Title
- Advances in Cryptology - EUROCRYPT 2009
- Book Subtitle
- 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings
- Pages
- pp 443-461
- Copyright
- 2009
- DOI
- 10.1007/978-3-642-01001-9_26
- Print ISBN
- 978-3-642-01000-2
- Online ISBN
- 978-3-642-01001-9
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- 5479
- Series ISSN
- 0302-9743
- Publisher
- Springer Berlin Heidelberg
- Copyright Holder
- Springer-Verlag Berlin Heidelberg
- Additional Links
- Topics
- Industry Sectors
- eBook Packages
- Editors
-
- Antoine Joux (16)
- Editor Affiliations
-
- 16. DGA and University of Versailles Saint-Quentin-en-Yvelines
- Authors
-
- François-Xavier Standaert (17)
- Tal G. Malkin (18)
- Moti Yung (18) (19)
- Author Affiliations
-
- 17. UCL Crypto Group, Université catholique de Louvain,
- 18. Dept. of Computer Science, Columbia University,
- 19. Google Inc.,
Continue reading...
To view the rest of this content please follow the download PDF link above.