Advances in Cryptology - ASIACRYPT 2013
Volume 8269 of the series Lecture Notes in Computer Science pp 486-505
Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests
- Luke MatherAffiliated withDepartment of Computer Science, University of Bristol
- , Elisabeth OswaldAffiliated withDepartment of Computer Science, University of Bristol
- , Joe BandenburgAffiliated withDepartment of Computer Science, University of Bristol
- , Marcin WójcikAffiliated withDepartment of Computer Science, University of Bristol
Abstract
The development of a leakage detection testing methodology for the side-channel resistance of cryptographic devices is an issue that has received recent focus from standardisation bodies such as NIST. Statistical techniques such as hypothesis and significance testing appear to be ideally suited for this purpose. In this work we evaluate the candidacy of three such detection tests: a t-test proposed by Cryptography Research Inc., and two mutual information-based tests, one in which data is treated as continuous and one as discrete. Our evaluation investigates three particular areas: statistical power, the effectiveness of multiplicity corrections, and computational complexity. To facilitate a fair comparison we conduct a novel a priori statistical power analysis of the three tests in the context of side-channel analysis, finding surprisingly that the continuous mutual information and t-tests exhibit similar levels of power. We also show how the inherently parallel nature of the continuous mutual information test can be leveraged to reduce a large computational cost to insignificant levels. To complement the a priori statistical power analysis we include two real-world case studies of the tests applied to software and hardware implementations of the AES.
- Title
- Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests
- Book Title
- Advances in Cryptology - ASIACRYPT 2013
- Book Subtitle
- 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I
- Pages
- pp 486-505
- Copyright
- 2013
- DOI
- 10.1007/978-3-642-42033-7_25
- Print ISBN
- 978-3-642-42032-0
- Online ISBN
- 978-3-642-42033-7
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- 8269
- Series ISSN
- 0302-9743
- Publisher
- Springer Berlin Heidelberg
- Copyright Holder
- Springer-Verlag Berlin Heidelberg
- Additional Links
- Topics
- Industry Sectors
- eBook Packages
- Editors
-
-
Kazue Sako
(16)
-
Palash Sarkar
(17)
-
Kazue Sako
- Editor Affiliations
-
- 16. NEC Corporation
- 17. Indian Statistical Institute
- Authors
-
-
Luke Mather
(18)
-
Elisabeth Oswald
(18)
-
Joe Bandenburg
(18)
-
Marcin Wójcik
(18)
-
Luke Mather
- Author Affiliations
-
- 18. Department of Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road, BS8 1UB, Bristol, UK
Continue reading...
To view the rest of this content please follow the download PDF link above.