4.7 Article

The Side-channel Metrics Cheat Sheet

期刊

ACM COMPUTING SURVEYS
卷 55, 期 10, 页码 -

出版社

ASSOC COMPUTING MACHINERY
DOI: 10.1145/3565571

关键词

Side-channel attacks; side-channel analysismetrics; information theoretic metrics; cryptography

向作者/读者索取更多资源

Side-channel attacks exploit physical observables of cryptographic devices to extract secrets. This work reviews commonly used metrics in side-channel analysis, providing a self-contained presentation of each metric and discussing their limitations. The metrics are practically demonstrated on examples of the Advanced Encryption Standard (AES), and the software implementation is made available as open source. This work goes beyond a survey and enables researchers and practitioners to conduct well-informed security evaluations by understanding the supporting and summarizing metrics.
Side-channel attacks exploit a physical observable originating from a cryptographic device in order to extract its secrets. Many practically relevant advances in the field of side-channel analysis relate to security evaluations of cryptographic functions and devices. Accordingly, many metrics have been adopted or defined to express and quantify side-channel security. These metrics can relate to one another, but also conflict in terms of effectiveness, assumptions, and security goals. In this work, we review the most commonly used metrics in the field of side-channel analysis. We provide a self-contained presentation of each metric, along with a discussion of its limitations. We practically demonstrate the metrics on examples of relevant implementations of the Advanced Encryption Standard (AES), and make the software implementation of the presented metrics available to the community as open source. This work, being beyond a survey of the current status of metrics, will allow researchers and practitioners to produce a well-informed security evaluation through a better understanding of its supporting and summarizing metrics.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据