Security evaluations beyond computing power: How to analyze side-channel attacks you cannot mount?

74Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Current key sizes for symmetric cryptography are usually required to be at least 80-bit long for short-term protection, and 128-bit long for long-term protection. However, current tools for security evaluations against side-channel attacks do not provide a precise estimation of the remaining key strength after some leakage has been observed, e.g. in terms of number of candidates to test. This leads to an uncomfortable situation, where the security of an implementation can be anywhere between enumerable values (i.e. 2 10-250 key candidates to test) and the full key size (i.e. 260-2128 key candidates to test). In this paper, we propose a solution to this issue, and describe a key rank estimation algorithm that provides tight bounds for the security level of leaking cryptographic devices. As a result and for the first time, we are able to analyze the full complexity of "standard" (i.e. divide-and-conquer) side-channel attacks, in terms of their tradeoff between time, data and memory complexity. © 2013 International Association for Cryptologic Research.

Cite

CITATION STYLE

APA

Veyrat-Charvillon, N., Gérard, B., & Standaert, F. X. (2013). Security evaluations beyond computing power: How to analyze side-channel attacks you cannot mount? In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7881 LNCS, pp. 126–141). https://doi.org/10.1007/978-3-642-38348-9_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free