entropy-logo

Journal Browser

Journal Browser

An Information-Theoretic Approach to Side-Channel Analysis

A special issue of Entropy (ISSN 1099-4300). This special issue belongs to the section "Information Theory, Probability and Statistics".

Deadline for manuscript submissions: 30 June 2024 | Viewed by 2634

Special Issue Editors

Secure-IC SAS, Paris, France
Interests: information theory (IT); side-channel analysis (SCA); related countermeasures (masking)

E-Mail Website
Guest Editor
Secure-IC SAS and Télécom Paris, Paris, France
Interests: trusted computing for embedded devices; cyber-physical security; prototyping cryptographic designs in ASIC and in FPGA; mathematics for side-channel and fault injection analyses; formal proofs

E-Mail Website
Guest Editor
I2M, CNRS, Aix-Marseille University, Centrale Marseille, Marseilles, France
Interests: coding theory; algebraic combinatorics; number theory
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
LTCI, Télécom Paris, Institut Polytechnique de Paris, 91120 Palaiseau, France
Interests: (general) mathematics; cryptography (side channel analysis); coding theory; information theory

Special Issue Information

Dear Colleagues,

Processing sensitive data—personal information, PII, cryptographic keys and tokens, etc.—requires great caution because of potential information theft or manipulation. One classical adversarial method to achieve information extraction is to leverage side-channels. Side-channel analyses are as old as the classified "tempest" interception, aiming at spying at screens and keyboards. Then, timing attacks were put forth in 1996, followed by power analysis attacks in 1999. Such devastating attacks gave rise to several security certification schemes, such as Common Criteria and NIST FIPS 140 referentials. Recently, the Spectre and Meltdown side-channel attacks have renewed the interest in such analyses.

Side-channel attacks compromise systems’ security. They are mostly undetectable due to their stealthy behavior. Their risk is thus extremely high, and it is paramount to understand them well. This is all the more true as countermeasures can be designed. Such countermeasures cost resources and are expected to be efficient. However, an important issue is how to rate them, even assuming the worst case of the most powerful attacker. For all these reasons, formally capturing side-channel analyses is a necessary prerequisite.

Information theory seems to be the most suitable framework for this task, because it is general and it is capable of tolerating abstractions. It also encompasses several relevant security metrics, such as leakage measurement, attack success rate, and guessing entropy. In this Special Issue, we invite submissions of original works pursuing such effort.

List of topics:

We welcome contributions on the following topics.

  • Theoretical frameworks for side-channel analysis;
  • New mathematical descriptions of side-channels;
  • Information-theoretic measures for information leakage;
  • Tight bounds on the efficiency of attacks and countermeasures;
  • Quantitative methods to detect or measure information leakage;
  • Practical analysis results on use-cases;
  • Novel paradigms for modeling side-channel analyses.

Dr. Wei Cheng
Prof. Dr. Sylvain Guilley
Prof. Dr. Patrick Solé
Prof. Dr. Olivier Rioul
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • information theory
  • side-channel analysis
  • attacks
  • bounds
  • countermeasures

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

15 pages, 3177 KiB  
Article
Template Attack of LWE/LWR-Based Schemes with Cyclic Message Rotation
by Yajing Chang, Yingjian Yan, Chunsheng Zhu and Pengfei Guo
Entropy 2022, 24(10), 1489; https://doi.org/10.3390/e24101489 - 18 Oct 2022
Cited by 4 | Viewed by 1667
Abstract
The side-channel security of lattice-based post-quantum cryptography has gained extensive attention since the standardization of post-quantum cryptography. Based on the leakage mechanism in the decapsulation stage of LWE/LWR-based post-quantum cryptography, a message recovery method, with templates and cyclic message rotation targeting the message [...] Read more.
The side-channel security of lattice-based post-quantum cryptography has gained extensive attention since the standardization of post-quantum cryptography. Based on the leakage mechanism in the decapsulation stage of LWE/LWR-based post-quantum cryptography, a message recovery method, with templates and cyclic message rotation targeting the message decoding operation, was proposed. The templates were constructed for the intermediate state based on the Hamming weight model and cyclic message rotation was used to construct special ciphertexts. Using the power leakage during operation, secret messages in the LWE/LWR-based schemes were recovered. The proposed method was verified on CRYSTAL-Kyber. The experimental results demonstrated that this method could successfully recover the secret messages used in the encapsulation stage, thereby recovering the shared key. Compared with existing methods, the power traces required for templates and attack were both reduced. The success rate was significantly increased under the low SNR, indicating a better performance with lower recovery cost. The message recovery success rate could reach 99.6% with sufficient SNR. Full article
(This article belongs to the Special Issue An Information-Theoretic Approach to Side-Channel Analysis)
Show Figures

Figure 1

Back to TopTop