Codes for side-channel attacks and protections

Sylvain Guilley, Annelie Heuser, Olivier Rioul

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This article revisits side-channel analysis from the standpoint of coding theory. On the one hand, the attacker is shown to apply an optimal decoding algorithm in order to recover the secret key from the analysis of the side-channel. On the other hand, the side-channel protections are presented as a coding problem where the information is mixed with randomness to weaken as much as possible the sensitive information leaked into the side-channel. Therefore, the field of side-channel analysis is viewed as a struggle between a coder and a decoder. In this paper, we focus on the main results obtained through this analysis. In terms of attacks, we discuss optimal strategy in various practical contexts, such as type of noise, dimensionality of the leakage and of the model, etc. Regarding countermeasures, we give a formal analysis of some masking schemes, including enhancements based on codes contributed via fruitful collaborations with Claude Carlet.

Original languageEnglish
Title of host publicationCodes, Cryptology and Information Security - 2nd International Conference, C2SI 2017, Proceedings In Honor of Claude Carlet
EditorsAbderrahmane Nitaj, Said El Hajji, El Mamoun Souidi
PublisherSpringer Verlag
Pages35-55
Number of pages21
ISBN (Print)9783319555881
DOIs
Publication statusPublished - 1 Jan 2017
Externally publishedYes
Event2nd International Conference on Codes, Cryptology and Information Security, C2SI 2017 - Rabat, Morocco
Duration: 10 Apr 201712 Apr 2017

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10194 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2nd International Conference on Codes, Cryptology and Information Security, C2SI 2017
Country/TerritoryMorocco
City Rabat
Period10/04/1712/04/17

Fingerprint

Dive into the research topics of 'Codes for side-channel attacks and protections'. Together they form a unique fingerprint.

Cite this