Access the full text.
Sign up today, get DeepDyve free for 14 days.
L. Birgé, Y. Rozenholc (2006)
How many bins should be put in a regular histogramEsaim: Probability and Statistics, 10
L. Wasserman (2004)
All of StatisticsTechnometrics, 46
Benedikt Gierlichs, L. Batina, B. Preneel, I. Verbauwhede (2010)
Revisiting Higher-Order DPA Attacks:IACR Cryptol. ePrint Arch., 2009
E. Prouff, Matthieu Rivain (2009)
Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis
A Generic Side-Channel Distinguisher
Bernard Silverman (1987)
Density Estimation for Statistics and Data Analysis
Alexander Gray, A. Moore (2003)
Nonparametric Density Estimation: Toward Computational Tractability
Suresh Chari, J. Rao, P. Rohatgi (2002)
Template Attacks
Siva Yerubandi (2002)
Differential Power Analysis
L. Wasserman (2004)
All of Statistics: A Concise Course in Statistical Inference
Éric Brier, Christophe Clavier, Francis Olivier (2004)
Correlation Power Analysis with a Leakage Model
Nicolas Veyrat-Charvillon, François-Xavier Standaert (2009)
Mutual Information Analysis: How, When and Why?
A. Canteaut, M. Trabbia (2000)
Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5
A. Moradi, Nima Mousavi, C. Paar, M. Salmasizadeh (2009)
A Comparative Study of Mutual Information Analysis under a Gaussian Assumption
S. Guilley, L. Sauvage, P. Hoogvorst, R. Pacalet, G. Bertoni, S. Chaudhuri (2008)
Security Evaluation of WDDL and SecLib Countermeasures against Power AttacksIEEE Transactions on Computers, 57
J. Beirlant, E. Dudewicz, L. Györfi, I. Denes (1997)
Nonparametric entropy estimation. An overview, 6
E. Prouff (2005)
DPA Attacks and S-Boxes
(1999)
CRYPTO 1999
François-Xavier Standaert, T. Malkin, M. Yung (2009)
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version)
Suresh Chari, C. Jutla, J. Rao, P. Rohatgi (1999)
Towards Sound Approaches to Counteract Power-Analysis Attacks
H. Kile (2010)
Bandwidth Selection in Kernel Density Estimation
Kerstin Lemke-Rust, C. Paar (2007)
Gaussian Mixture Models for Higher-Order Side Channel Analysis
M. Wand (1997)
Data-Based Choice of Histogram Bin WidthThe American Statistician, 51
D. Scott (1992)
Multivariate Density Estimation, Theory, Practice and VisualizationThe Statistician, 43
François-Xavier Standaert, T. Malkin, M. Yung (2006)
A Formal Practice-Oriented Model for the Analysis of Side-Channel Attacks
E. Prouff, Matthieu Rivain, R. Bevan (2009)
Statistical Analysis of Second Order Differential Power AnalysisIEEE Transactions on Computers, 58
M. Carreira-Perpiñán (2000)
Mode-Finding for Mixtures of Gaussian DistributionsIEEE Trans. Pattern Anal. Mach. Intell., 22
A large variety of side channel analyses performed on embedded devices involve the linear correlation coefficient as wrong-key distinguisher. This coefficient is actually a sound statistical tool to quantify linear dependencies between univariate variables. At CHES 2008, Gierlichs et al. proposed to use the mutual information measure as an alternative to the correlation coefficient since it detects any kind of statistical dependency. Substituting it for the correlation coefficient may indeed be considered as a natural extension of the existing attacks. Nevertheless, the first published applications have raised several open issues. In this paper, we conduct a theoretical analysis of MIA in the Gaussian leakage model to explore the reasons why and when it is a sound key recovery attack. Also, we generalise MIA to higher-orders (i.e., against masked implementations). Secondly, we address the main practical issue of MIA: the mutual information estimation which itself relies on the estimation of statistical distributions. We describe three classical estimation methods and we apply them in the context of MIA. Eventually, we present various attack simulations and practical attack experiments that allow us to check the efficiency of MIA in practice and to compare it to classical correlation-based attacks.
International Journal of Applied Cryptography – Inderscience Publishers
Published: Jan 1, 2010
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.