GE vs GM: Efficient side-channel security evaluations on full cryptographic keys

Security evaluations for full cryptographic keys is a very important research topic since the past decade. An efficient rank estimation algorithm was proposed at FSE 2015 to approximate the empirical guessing entropy remaining after a side-channel attack on a full AES key, by combining information...

Full description

Bibliographic Details
Main Authors: Anca Rădulescu, Pantelimon G. Popescu, Marios O. Choudary
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2022-08-01
Series:Transactions on Cryptographic Hardware and Embedded Systems
Subjects:
Online Access:https://ojs-dev.ub.rub.de/index.php/TCHES/article/view/9844
_version_ 1797690069239201792
author Anca Rădulescu
Pantelimon G. Popescu
Marios O. Choudary
author_facet Anca Rădulescu
Pantelimon G. Popescu
Marios O. Choudary
author_sort Anca Rădulescu
collection DOAJ
description Security evaluations for full cryptographic keys is a very important research topic since the past decade. An efficient rank estimation algorithm was proposed at FSE 2015 to approximate the empirical guessing entropy remaining after a side-channel attack on a full AES key, by combining information from attacks on each byte of he key independently. However, these could not easily scale to very large keys over 1024 bits. Hence, at CHES 2017, it was proposed a new approach for scalable security evaluations based on Massey’s guessing entropy, which was shown tight and scalable to very large keys, even beyond 8192 bits. Then, at CHES 2020, it was proposed a new method for estimating the empirical guessing entropy for the case of full-key evaluations, showing also important divergences between the empirical guessing entropy and Massey’s guessing entropy. However, there has been some confusion in recent publications of side-channel evaluation methods relying on these two variants of the guessing entropy. Furthermore, it remained an open problem to decide which of these methods should be used and in which context, particularly given the wide acceptance of the empirical guessing entropy in the side-channel community and the relatively little use of the other. In this paper, we tackle this open problem through several contributions. First of all, we provide an unitary presentation of both versions of the guessing entropy, allowing an easy comparison of the two metrics. Secondly, we compare the two metrics using a set of common and relevant indicators, as well as three different datasets for side-channel evaluations (simulated, AVR XMEGA 8-bit microcontroller and a 32-bit device). We used these indicators and datasets also to compare the three full-key evaluation methods from FSE 2015, CHES 2017 and CHES 2020, allowing us to provide a clear overview of the usefulness and limitations of each method. Furthermore, our analysis has enabled us to find a new method for verifying the soundness of a leakage model, by comparing both versions of the guessing entropy. This method can be easily extended to full-key evaluations, hence leading to a new useful method for side-channel evaluations.
first_indexed 2024-03-12T01:54:14Z
format Article
id doaj.art-6796b366cea84e2e96c4b63d503cace6
institution Directory Open Access Journal
issn 2569-2925
language English
last_indexed 2024-03-12T01:54:14Z
publishDate 2022-08-01
publisher Ruhr-Universität Bochum
record_format Article
series Transactions on Cryptographic Hardware and Embedded Systems
spelling doaj.art-6796b366cea84e2e96c4b63d503cace62023-09-08T07:01:06ZengRuhr-Universität BochumTransactions on Cryptographic Hardware and Embedded Systems2569-29252022-08-012022410.46586/tches.v2022.i4.886-905GE vs GM: Efficient side-channel security evaluations on full cryptographic keysAnca Rădulescu0Pantelimon G. Popescu1Marios O. Choudary2University Politehnica of Bucharest, Bucharest, RomaniaUniversity Politehnica of Bucharest, Bucharest, RomaniaUniversity Politehnica of Bucharest, Bucharest, Romania Security evaluations for full cryptographic keys is a very important research topic since the past decade. An efficient rank estimation algorithm was proposed at FSE 2015 to approximate the empirical guessing entropy remaining after a side-channel attack on a full AES key, by combining information from attacks on each byte of he key independently. However, these could not easily scale to very large keys over 1024 bits. Hence, at CHES 2017, it was proposed a new approach for scalable security evaluations based on Massey’s guessing entropy, which was shown tight and scalable to very large keys, even beyond 8192 bits. Then, at CHES 2020, it was proposed a new method for estimating the empirical guessing entropy for the case of full-key evaluations, showing also important divergences between the empirical guessing entropy and Massey’s guessing entropy. However, there has been some confusion in recent publications of side-channel evaluation methods relying on these two variants of the guessing entropy. Furthermore, it remained an open problem to decide which of these methods should be used and in which context, particularly given the wide acceptance of the empirical guessing entropy in the side-channel community and the relatively little use of the other. In this paper, we tackle this open problem through several contributions. First of all, we provide an unitary presentation of both versions of the guessing entropy, allowing an easy comparison of the two metrics. Secondly, we compare the two metrics using a set of common and relevant indicators, as well as three different datasets for side-channel evaluations (simulated, AVR XMEGA 8-bit microcontroller and a 32-bit device). We used these indicators and datasets also to compare the three full-key evaluation methods from FSE 2015, CHES 2017 and CHES 2020, allowing us to provide a clear overview of the usefulness and limitations of each method. Furthermore, our analysis has enabled us to find a new method for verifying the soundness of a leakage model, by comparing both versions of the guessing entropy. This method can be easily extended to full-key evaluations, hence leading to a new useful method for side-channel evaluations. https://ojs-dev.ub.rub.de/index.php/TCHES/article/view/9844side-channel attackssecurity evaluationsguessing entropyboundsscalability
spellingShingle Anca Rădulescu
Pantelimon G. Popescu
Marios O. Choudary
GE vs GM: Efficient side-channel security evaluations on full cryptographic keys
Transactions on Cryptographic Hardware and Embedded Systems
side-channel attacks
security evaluations
guessing entropy
bounds
scalability
title GE vs GM: Efficient side-channel security evaluations on full cryptographic keys
title_full GE vs GM: Efficient side-channel security evaluations on full cryptographic keys
title_fullStr GE vs GM: Efficient side-channel security evaluations on full cryptographic keys
title_full_unstemmed GE vs GM: Efficient side-channel security evaluations on full cryptographic keys
title_short GE vs GM: Efficient side-channel security evaluations on full cryptographic keys
title_sort ge vs gm efficient side channel security evaluations on full cryptographic keys
topic side-channel attacks
security evaluations
guessing entropy
bounds
scalability
url https://ojs-dev.ub.rub.de/index.php/TCHES/article/view/9844
work_keys_str_mv AT ancaradulescu gevsgmefficientsidechannelsecurityevaluationsonfullcryptographickeys
AT pantelimongpopescu gevsgmefficientsidechannelsecurityevaluationsonfullcryptographickeys
AT mariosochoudary gevsgmefficientsidechannelsecurityevaluationsonfullcryptographickeys