Article Free Access
- Authors:
- f*ckiang Lu China Quality Certification Center South China Laboratory, Guangzhou, China
China Quality Certification Center South China Laboratory, Guangzhou, China
Search about this author
- Weijian Li https://ror.org/02pcb5m77Guangdong Polytechnic Normal University, Guangzhou, China
https://ror.org/02pcb5m77Guangdong Polytechnic Normal University, Guangzhou, China
Search about this author
- Zanyu Huang https://ror.org/02pcb5m77Guangdong Polytechnic Normal University, Guangzhou, China
https://ror.org/02pcb5m77Guangdong Polytechnic Normal University, Guangzhou, China
Search about this author
- Chuanlu Chen China Quality Certification Center South China Laboratory, Guangzhou, China
China Quality Certification Center South China Laboratory, Guangzhou, China
Search about this author
- Peng Chen China Quality Certification Center South China Laboratory, Guangzhou, China
China Quality Certification Center South China Laboratory, Guangzhou, China
Search about this author
Web and Big Data: 7th International Joint Conference, APWeb-WAIM 2023, Wuhan, China, October 6–8, 2023, Proceedings, Part IVOct 2023Pages 328–342https://doi.org/10.1007/978-981-97-2421-5_22
Published:12 May 2024Publication History
- 0citation
- 0
- Downloads
Metrics
Total Citations0Total Downloads0Last 12 Months0
Last 6 weeks0
- Get Citation Alerts
New Citation Alert added!
This alert has been successfully added and will be sent to:
You will be notified whenever a record that you have chosen has been cited.
To manage your alert preferences, click on the button below.
Manage my Alerts
New Citation Alert!
Please log in to your account
- Publisher Site
Web and Big Data: 7th International Joint Conference, APWeb-WAIM 2023, Wuhan, China, October 6–8, 2023, Proceedings, Part IV
An Improved Method ofSide Channel Leak Assessment forCryptographic Algorithm
Pages 328–342
PreviousChapterNextChapter
Abstract
As a standard method of side channel leak assessment, TVLA is a popular research direction of side channel attack. TVLA mainly conducts leak assessment based on Welch’s t-test or paired t-test, but in some evaluation scenarios, different leak assessment results may appear in the two hypothesis tests. Firstly, the modified relationship between the two kinds of t-tests is studied in theory, and then it is pointed out that the paired t-test is better when there is a positive correlation between the two groups of sampled populations to be evaluated, while the correcting two-sample t-test is needed when there is an independent or negative correlation. Secondly, it is verified by experiments that in common experimental scenarios, such as noise of common measuring equipment, temperature fluctuation and the choice of cross-input plaintext sequence will lead to positive correlation between samples, especially in the first two scenarios, the paired t-test can play a fast, efficient and robust role. Theoretical analysis and experimental results show that the method of mutual correction by two hypothesis tests ensures the accuracy and efficiency of side channel leakage assessment.
References
- 1.Kocher PCKoblitz NTiming attacks on implementations of diffie-hellman, RSA, DSS, and other systemsAdvances in Cryptology — CRYPTO ’961996HeidelbergSpringer10411310.1007/3-540-68697-5_9Google Scholar
Cross Ref
- 2.Hongsong SHIJinping GAOWei JIAet al.Analyse of the security architecture and policy model in the common criteriaJ. Tsinghua Univ. (Sci. Technol.)20165654934983615849Google Scholar
- 3.Becker G, Cooper J, Demulder E, et al. Test vector leakage assessment (TVLA) methodology in practice. In: International Cryptographic Module Conference, pp. 1001-1013. Springer, Cham (2013)Google Scholar
- 4.Schneider, T., Moradi, A.: Leakage assessment methodology. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 495–513. Springer, Cham (2015)Google Scholar
- 5.Ding AAChen CEisenbarth TStandaert F-XOswald ESimpler, faster, and more robust t-test based leakage detectionConstructive Side-Channel Analysis and Secure Design2016ChamSpringer16318310.1007/978-3-319-43283-0_10Google Scholar
Cross Ref
- 6.Merino del Pozo SStandaert F-XGuilley SGetting the most out of leakage detectionConstructive Side-Channel Analysis and Secure Design2017ChamSpringer26428110.1007/978-3-319-64647-3_16Google Scholar
Cross Ref
- 7.Bronchain OSchneider TStandaert F-XMulti-tuple leakage detection and the dependent signal issueIACR Trans. Cryptographic Hardware Embed. Syst.2019201931834510.46586/tches.v2019.i2.318-345Google Scholar
Cross Ref
- 8.Bilgin BGierlichs BNikova SNikov VRijmen VSarkar PIwata THigher-order threshold implementationsAdvances in Cryptology – ASIACRYPT 20142014HeidelbergSpringer32634310.1007/978-3-662-45608-8_18Google Scholar
Cross Ref
- 9.Masoum MA highly efficient and secure hardware implementation of the advanced encryption standardJ. Inf. Secur. Appl.201948102371102384Google Scholar
- 10.Bache FPlump CWloka Jet al.Evaluation of (power) side-channels in cryptographic implementationsIt-Inf. Technol.20196111528Google Scholar
Cross Ref
- 11.Jiazhe CHexin LYanan Wet al.Evaluating side-channel information leakage in 3DES using the t-testJ. Tsinghua Univ. (Sci. Technol.)20166554995033615850Google Scholar
- 12.Shahverdi ATaha MEisenbarth TLightweight side channel resistance: threshold implementations of SimonIEEE Trans. Comput.2017664661671362343610.1109/TC.2016.2614504Google Scholar
Digital Library
- 13.Durvaux FStandaert F-XFischlin MCoron J-SFrom improved leakage detection to the detection of points of interests in leakage tracesAdvances in Cryptology – EUROCRYPT 20162016HeidelbergSpringer24026210.1007/978-3-662-49890-3_10Google Scholar
Cross Ref
- 14.Moradi ARichter BSchneider Tet al.Leakage detection with the x2-testIACR Trans. Cryptographic Hardware Embed. Syst.2018201820923710.46586/tches.v2018.i1.209-237Google Scholar
Cross Ref
- 15.Zimmerman, D.W.: Correcting Two-Sample “z” and “t” tests for correlation: an alternative to one-sample tests on difference scores. Psicologica: Int. J. Methodol. Exp. Psychol. 33(2), 391–418 (2012)Google Scholar
- 16.Bronchain OHendrickx JMMassart COlshevsky AStandaert F-XBoldyreva AMicciancio DLeakage certification revisited: bounding model errors in side-channel security evaluationsAdvances in Cryptology – CRYPTO 20192019ChamSpringer71373710.1007/978-3-030-26948-7_25Google Scholar
Digital Library
- 17.Standaert F-XBilgin BFischer J-BHow (Not) to use welch’s t-test in side-channel security evaluationsSmart Card Research and Advanced Applications2019ChamSpringer657910.1007/978-3-030-15462-2_5Google Scholar
Cross Ref
- 18.Hsu, H., Lachenbruch, P.A.: Paired t test. Wiley encyclopedia of clinical trials, pp. 1–3 (2007)Google Scholar
- 19.Zimmerman DWTeacher’s corner: a note on interpretation of the paired-samples t testJ. Educ. Behav. Stat.1997223349360Google Scholar
- 20.Mather LOswald EBandenburg JWójcik MSako KSarkar PDoes my device leak information? An a priori statistical power analysis of leakage detection testsAdvances in Cryptology - ASIACRYPT 20132013HeidelbergSpringer48650510.1007/978-3-642-42033-7_25Google Scholar
Digital Library
- 21.David HAGunnink JLThe paired t test under artificial pairingAm. Stat.19975119121440935Google Scholar
- 22.Yang WJia ASide-channel leakage detection with one-way analysis of varianceSecur. Commun. Netw.2021202111310.1155/2021/2459628Google Scholar
Digital Library
- 23.Yaru WANGMing TANGSide channel leakage assessment with the Bartlett and multi-classes F-testJ. Commun.202142123543Google Scholar
- 24.Wang YTang MWang Pet al.The Levene test based-leakage assessmentIntegration20228718219310.1016/j.vlsi.2022.06.013Google Scholar
Digital Library
Cited By
View all
Recommendations
- The Levene test based-leakage assessment
Abstract
The secret information is split into several parts(multivariate) in the high-order mask. The test vector leakage assessment (TVLA) relied on Welch's t-test(T-test), the analysis of variance (ANOVA) and normalized inter-class variance (NICV) ...
Highlights
- a new method that quickly and reliably evaluate the security of IT products.
- The Levene test used to in leakage assessment of side channel in high order mask.
- Compared with the original detection method, the new method can reduce ...
Read More
- A Study on Power Side Channels on Mobile Devices
Internetware '15: Proceedings of the 7th Asia-Pacific Symposium on Internetware
Power side channel is a very important category of side channels, which can be exploited to steal confidential information from a computing system by analyzing its power consumption. In this paper, we demonstrate the existence of various power side ...
Read More
- Noise Reduction in Side Channel Attack Using Fourth-Order Cumulant
Side channel attacks exploit physical information leaked during the operation of a cryptographic device (e.g., a smart card). The confidential data, which can be leaked from side channels, are timing of operations, power consumption, and electromagnetic ...
Read More
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in
Full Access
Get this Publication
- Information
- Contributors
Published in
Web and Big Data: 7th International Joint Conference, APWeb-WAIM 2023, Wuhan, China, October 6–8, 2023, Proceedings, Part IV
Oct 2023
538 pages
ISBN:978-981-97-2420-8
DOI:10.1007/978-981-97-2421-5
- Editors:
- Xiangyu Song
https://ror.org/03qdqbt06Peng Cheng Laboratory, Shenzhen, China
, - Ruyi Feng
China University of Geosciences, Wuhan, China
, - Yunliang Chen
https://ror.org/04gcegc37China University of Geosciences, Wuhan, China
, - Jianxin Li
https://ror.org/02czsnj07Deakin University, Burwood, VIC, Australia
, - Geyong Min
University of Exeter, Exeter, UK
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024
Sponsors
In-Cooperation
Publisher
Springer-Verlag
Berlin, Heidelberg
Publication History
- Published: 12 May 2024
Author Tags
- TVLA
- paired t-test
- correcting two-sample t-tests
- assessment of side channel
- side channel attack
Qualifiers
- Article
Conference
Funding Sources
Other Metrics
View Article Metrics
- Bibliometrics
- Citations0
Article Metrics
- View Citations
Total Citations
Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
View Author Metrics
Cited By
This publication has not been cited yet
Digital Edition
View this article in digital edition.
View Digital Edition
- Figures
- Other
Close Figure Viewer
Browse AllReturn
Caption
View Table of Contents
Export Citations
Your Search Results Download Request
We are preparing your search results for download ...
We will inform you here when the file is ready.
Download now!
Your Search Results Download Request
Your file of search results citations is now ready.
Download now!
Your Search Results Download Request
Your search export query has expired. Please try again.