Leakage Mapping: A Systematic Methodology for Assessing the Side-Channel Information Leakage of Cryptographic Implementations

  • Authors:
  • William E. Cobb;Rusty O. Baldwin;Eric D. Laspe

  • Affiliations:
  • Air Force Institute of Technology;Air Force Institute of Technology;Air Force Institute of Technology

  • Venue:
  • ACM Transactions on Information and System Security (TISSEC)
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

We propose a generalized framework to evaluate the side-channel information leakage of symmetric block ciphers. The leakage mapping methodology enables the systematic and efficient identification and mitigation of problematic information leakages by exhaustively considering relevant leakage models. The evaluation procedure bounds the anticipated resistance of an implementation to the general class of univariate differential side-channel analysis techniques. Typical applications are demonstrated using the well-known Hamming weight and Hamming distance leakage models, with recommendations for the incorporation of more accurate models. The evaluation results are empirically validated against correlation-based differential side-channel analysis attacks on two typical unprotected implementations of the Advanced Encryption Standard.