Towards Sound Approaches to Counteract Power-Analysis Attacks

Towards Sound Approaches to Counteract Power-Analysis Attacks

1999 | Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, and Pankaj Rohatgi
The paper "Towards Sound Approaches to Counteract Power-Analysis Attacks" by Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, and Pankaj Rohatgi addresses the issue of side-channel cryptanalysis, particularly power analysis attacks, which have been effective in compromising implementations on simple hardware platforms. The authors propose a scientific approach to counter these attacks by creating a model for the physical characteristics of the device and designing implementations that are provably secure within this model. They introduce an abstract model that approximates power consumption in most devices, especially small single-chip devices, and propose a generic technique to create implementations that are resistant to statistical attacks when a source of randomness exists. The technique is based on secret sharing schemes, where each bit of the computation is divided into shares, making any proper subset of shares statistically independent of the bit being encoded. This approach ensures that the adversary cannot predict any relevant bit without making run-specific assumptions, thus making statistical attacks impossible. The paper also proves lower bounds on the number of observations required to distinguish distributions used in power analysis attacks, providing a formal framework for the problem of computation in the presence of leaked side-channel information.The paper "Towards Sound Approaches to Counteract Power-Analysis Attacks" by Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, and Pankaj Rohatgi addresses the issue of side-channel cryptanalysis, particularly power analysis attacks, which have been effective in compromising implementations on simple hardware platforms. The authors propose a scientific approach to counter these attacks by creating a model for the physical characteristics of the device and designing implementations that are provably secure within this model. They introduce an abstract model that approximates power consumption in most devices, especially small single-chip devices, and propose a generic technique to create implementations that are resistant to statistical attacks when a source of randomness exists. The technique is based on secret sharing schemes, where each bit of the computation is divided into shares, making any proper subset of shares statistically independent of the bit being encoded. This approach ensures that the adversary cannot predict any relevant bit without making run-specific assumptions, thus making statistical attacks impossible. The paper also proves lower bounds on the number of observations required to distinguish distributions used in power analysis attacks, providing a formal framework for the problem of computation in the presence of leaked side-channel information.
Reach us at info@study.space