Abstract
Mutual Information Analysis (MIA) is a generic attack which aims at measuring dependencies between side-channel signals and intermediate data during cryptographic operations. In this paper, we propose a novel approach to estimate the mutual information based on higher-order cumulants. The simulation and experimental results show that the cumulant-based MIA can be a good method in both first- and second-order attacks. The implementation of the proposed method is practical and its extension to higher-order analysis does not require any additional development. Under higher-order statistics, we confirm the generality of MIA by recognizing the similitude between classical analysis and the cumulant-based MIA.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)
Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Transactions on Computer 51(5), 541–552 (2002)
Bevan, R., Knudsen, E.: Ways to Enhance DPA. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 327–342. Springer, Heidelberg (2003)
Mayer-Sommer, R.: Smartly analysing the simplicity and the power of simple power analysis on smartcards. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 78–92. Springer, Heidelberg (2000)
Coron, J.S., Kocher, P., Naccache, D.: Statistics and Secret Leakage. In: Omicini, A., Tolksdorf, R., Zambonelli, F. (eds.) ESAW 2000. LNCS (LNAI), vol. 1972, pp. 157–173. Springer, Heidelberg (2000)
Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004)
Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual Information Analysis: A Generic Side-Channel Distinguisher. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 426–442. Springer, Heidelberg (2008)
Aumonier, S.: Generalized Correlation Power Analysis. In: Proceedings of the Ecrypt Workshop Tools For Cryptanalysis 2007, Poland (September 2007)
Prouff, E., Rivain, M.: Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 499–518. Springer, Heidelberg (2009)
Prouff, E., Rivain, M., Bevan, R.: Statistical Analysis of Second Order Differential Power Analysis. In: IEEE Transaction on Computers. LNCS, vol. 5536, pp. 499–518. Springer, Heidelberg
Veyrat-Charvillon, N., Standaert, F.-X.: Mutual Information Analysis: How, When and Why. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 429–443. Springer, Heidelberg (2009)
Moradi, A., Mousavi, N., Paar, C., Salmasizadeh, M.: A Comparative Study of Mutual Information Analysis under a Gaussian Assumption. In: Youm, H.Y., Yung, M. (eds.) WISA 2009. LNCS, vol. 5932, pp. 193–205. Springer, Heidelberg (2009)
Gierlichs, B., Batina, L., Preneel, B., Verbauwhede, I.: Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol. 5985, pp. 221–234. Springer, Heidelberg (2010)
Daub, C.O., Steuer, R., Selbig, J., Kloska, S.: Estimating mutual information using B-spline functions - an improved similarity measure for analysing gene expression data. In: BMC Bioinformatics 2004 (2004), http://www.ncbi.nlm.nih.gov/pmc/articles/PMC516800/
Comon, P.: Independent Component Analysis, A new concept? Special Issue on High-Order Statistics, Signal Processing 36(3), 287–314 (1994)
McCullagh, P.: Tensor methods in statistics, ch. 5. Chapman and Hall, London, http://www.stat.uchicago.edu/~pmcc/tensorbook/
Georgiev, P., Relescu, A., Ralescu, D.: Cross-cumulants measure for independence. Journal of Statistical Planning and Inference 137, 1085–1098 (2006)
Dempster, A., Laird, N., Rubin, D.: Maximum likelihood for incomplete data via the EM algorithm. J. Roy. Statist. Soc., Ser., B 39(1), 1–38 (1977)
Flament, F., Guilley, S., Danger, J.-L., Elaabid, M.A., Maghrebi, H., Sauvage, L.: About Probability Density Function Estimation for Side Channel Analysis. In: Proceedings of First International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2010), Darmstadt, Germany (February 2010)
Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Toward sound approaches to counteract power analysis attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398–412. Springer, Heidelberg (1999)
Messerges, T.S.: Using second-order power analysis to attack DPA resistant software. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 238–251. Springer, Heidelberg (2000)
DPA Contest 2008/2009, http://projets.comelec.enst.fr/dpacontest/index.php
Kendall, M.G., Stuart, A.: The advanced theory of statistics, 2nd edn. Charles Griffin & Company Limited, London (1963)
Venelli, A.: Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines. In: Samarati, P., Tunstall, M., Posegga, J., Markantonakis, K., Sauveron, D. (eds.) WISTP 2010. LNCS, vol. 6033, pp. 17–30. Springer, Heidelberg (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Le, TH., Berthier, M. (2010). Mutual Information Analysis under the View of Higher-Order Statistics. In: Echizen, I., Kunihiro, N., Sasaki, R. (eds) Advances in Information and Computer Security. IWSEC 2010. Lecture Notes in Computer Science, vol 6434. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16825-3_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-16825-3_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16824-6
Online ISBN: 978-3-642-16825-3
eBook Packages: Computer ScienceComputer Science (R0)