Ding, A. Adam
[Department of Math., Northeastern University, Boston, MA, USA]
Zhang, Liwei
[Department of Math., Northeastern University, Boston, MA, USA]
Durvaux, François
[UCL]
Standaert, François-Xavier
[UCL]
Fei, Yunsi
[Department of ECE, Northeastern University, Boston, MA, USA]
Evaluation of side-channel leakage for cryptographic systems requires sound leakage detection procedures. The commonly used standard approach is the test vector leakage assessment (TVLA) procedure. We first relate TVLA to the statistical minimum p-value (mini-p) procedure, and propose a sound method of deciding leakage existence in the statistical hypothesis setting. An advanced statistical procedure, Higher Criticism (HC), is adopted to improve leakage detection when there are multiple leakage points. The HC-based procedure is optimal in side-channel leakage detection, because for a given number of traces with a given length, it detects the existence of leakage at the signal level as low as possibly detectable by any statistical procedure. Numerical studies show that our HC-based procedure perform as well as the mini-p based procedure when leakage signals are very sparse, and can improve the leakage detection significantly when there are multiple leakages.


- Goodwill, G., Jun, B., Jaffe, J., Rohatgi, P.: A testing methodology for side-channel resistance validation. In: NIST Non-Invasive Attack Testing Workshop, September 2011.
http://csrc.nist.gov/news_events/non-invasive-attack-testing-workshop/papers/08_Goodwill.pdf
- Cooper, J., DeMulder, E., Goodwill, G., Jaffe, J., Kenworthy, G., Rohatgi, P.: Test vector leakage assessment (TVLA) methodology in practice. In: International Cryptographic Module Conference (2013).
http://icmc-2013.org/wp/wp-content/uploads/2013/09/goodwillkenworthtestvector.pdf
- Mather Luke, Oswald Elisabeth, Bandenburg Joe, Wójcik Marcin, Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests, Advances in Cryptology - ASIACRYPT 2013 (2013) ISBN:9783642420320 p.486-505, 10.1007/978-3-642-42033-7_25
- Schneider Tobias, Moradi Amir, Leakage Assessment Methodology, Lecture Notes in Computer Science (2015) ISBN:9783662483237 p.495-513, 10.1007/978-3-662-48324-4_25
- Durvaux François, Standaert François-Xavier, From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces, Advances in Cryptology – EUROCRYPT 2016 (2016) ISBN:9783662498897 p.240-262, 10.1007/978-3-662-49890-3_10
- Ding A. Adam, Chen Cong, Eisenbarth Thomas, Simpler, Faster, and More Robust T-Test Based Leakage Detection, Constructive Side-Channel Analysis and Secure Design (2016) ISBN:9783319432823 p.163-183, 10.1007/978-3-319-43283-0_10
- Bilgin Begül, Gierlichs Benedikt, Nikova Svetla, Nikov Ventzislav, Rijmen Vincent, Higher-Order Threshold Implementations, Lecture Notes in Computer Science (2014) ISBN:9783662456071 p.326-343, 10.1007/978-3-662-45608-8_18
- Nascimento Erick, López Julio, Dahab Ricardo, Efficient and Secure Elliptic Curve Cryptography for 8-bit AVR Microcontrollers, Security, Privacy, and Applied Cryptography Engineering (2015) ISBN:9783319241258 p.289-309, 10.1007/978-3-319-24126-5_17
- De Cnudde Thomas, Bilgin Begül, Reparaz Oscar, Nikova Svetla, Higher-Order Glitch Resistant Implementation of the PRESENT S-Box, Cryptography and Information Security in the Balkans (2015) ISBN:9783319213552 p.75-93, 10.1007/978-3-319-21356-9_6
- Balasch Josep, Gierlichs Benedikt, Grosso Vincent, Reparaz Oscar, Standaert François-Xavier, On the Cost of Lazy Engineering for Masked Software Implementations, Smart Card Research and Advanced Applications (2015) ISBN:9783319167626 p.64-81, 10.1007/978-3-319-16763-3_5
- Jin Jiashun, Donoho David, Higher criticism for detecting sparse heterogeneous mixtures, 10.1214/009053604000000265
- Donoho D., Jin J., Higher criticism thresholding: Optimal feature selection when useful features are rare and weak, 10.1073/pnas.0807471105
- Robert C. P., Wood A. T. A., Report of the Editors-2007 : Editors’ Report, 10.1111/j.1467-9868.2007.00626.x
- Fan Jianqing, Feng Yang, Song Rui, Nonparametric Independence Screening in Sparse Ultra-High-Dimensional Additive Models, 10.1198/jasa.2011.tm09779
- Li Jian, Siegmund David, Higher criticism: $p$-values and criticism, 10.1214/15-aos1312
- Donoho David, Jin Jiashun, Higher Criticism for Large-Scale Inference, Especially for Rare and Weak Effects, 10.1214/14-sts506
- Wu Zheyang, Sun Yiming, He Shiquan, Cho Judy, Zhao Hongyu, Jin Jiashun, Detection boundary and Higher Criticism approach for rare and weak genetic effects, 10.1214/14-aoas724
- Ingster, Y.I.: Minimax detection of a signal for i (n)-balls. Math. Methods Stat. 7(4), 401–428 (1998)
- Archambeau C., Peeters E., Standaert F. -X., Quisquater J. -J., Template Attacks in Principal Subspaces, Lecture Notes in Computer Science (2006) ISBN:9783540465591 p.1-14, 10.1007/11894063_1
- Standaert François-Xavier, Archambeau Cedric, Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages, Cryptographic Hardware and Embedded Systems – CHES 2008 ISBN:9783540850526 p.411-425, 10.1007/978-3-540-85053-3_26
- Bär, M., Drexler, H., Pulkus, J.: Improved template attacks. In: International Workshop on Constructive Side-Channel Analysis and Secure Design (2010)
- Elaabid M. Abdelaziz, Meynard Olivier, Guilley Sylvain, Danger Jean-Luc, Combined Side-Channel Attacks, Information Security Applications (2011) ISBN:9783642179549 p.175-190, 10.1007/978-3-642-17955-6_13
- Choudary Omar, Kuhn Markus G., Efficient Template Attacks, Smart Card Research and Advanced Applications (2014) ISBN:9783319083018 p.253-270, 10.1007/978-3-319-08302-5_17
- Bruneau Nicolas, Guilley Sylvain, Heuser Annelie, Marion Damien, Rioul Olivier, Less is More, Lecture Notes in Computer Science (2015) ISBN:9783662483237 p.22-41, 10.1007/978-3-662-48324-4_2
- Zhang, L., Ding, A.A., Durvaux, F., Standaert, F.-X., Fei, Y.: Towards sound and optimal leakage detection procedure, Cryptology ePrint Archive, Report 2017/287 (2017).
http://eprint.iacr.org/2017/287
- Testing Statistical Hypotheses, ISBN:9780387988641, 10.1007/0-387-27605-x
- Hall Peter, Jin Jiashun, Properties of higher criticism under strong dependence, 10.1214/009053607000000767
- Barnett Ian, Mukherjee Rajarshi, Lin Xihong, The Generalized Higher Criticism for Testing SNP-Set Effects in Genetic Association Studies, 10.1080/01621459.2016.1192039
- Mangard S., Oswald E., Standaert F.-X., One for all – all for one: unifying standard differential power analysis attacks, 10.1049/iet-ifs.2010.0096
- Testbed for side channel analysis and security evaluation (2014).
http://tescase.coe.neu.edu
- Akkar Mehdi-Laurent, Giraud Christophe, An Implementation of DES and AES, Secure against Some Attacks, Cryptographic Hardware and Embedded Systems — CHES 2001 (2001) ISBN:9783540425212 p.309-318, 10.1007/3-540-44709-1_26
- Chari Suresh, Jutla Charanjit S., Rao Josyula R., Rohatgi Pankaj, Towards Sound Approaches to Counteract Power-Analysis Attacks, Advances in Cryptology — CRYPTO’ 99 (1999) ISBN:9783540663478 p.398-412, 10.1007/3-540-48405-1_26
- Schramm Kai, Paar Christof, Higher Order Masking of the AES, Topics in Cryptology – CT-RSA 2006 (2006) ISBN:9783540310334 p.208-225, 10.1007/11605805_14
- Prouff E., Rivain M., Bevan R., Statistical Analysis of Second Order Differential Power Analysis, 10.1109/tc.2009.15
- Ding A. Adam, Zhang Liwei, Fei Yunsi, Luo Pei, A Statistical Model for Higher Order DPA on Masked Devices, Advanced Information Systems Engineering (2014) ISBN:9783642387081 p.147-169, 10.1007/978-3-662-44709-3_9
Bibliographic reference |
Ding, A. Adam ; Zhang, Liwei ; Durvaux, François ; Standaert, François-Xavier ; Fei, Yunsi. Towards Sound and Optimal Leakage Detection Procedure.16th International Conference on Smart Card Research and Advanced Applications (CARDIS 2017) (Lugano (Switzerland), du 13/11/2017 au 15/11/2017). In: Proceedings of CARDIS 2017, 2017 |
Permanent URL |
http://hdl.handle.net/2078.1/210684 |