TY - GEN
T1 - Comparison between side-channel analysis distinguishers
AU - Maghrebi, Houssem
AU - Rioul, Olivier
AU - Guilley, Sylvain
AU - Danger, Jean Luc
PY - 2012/11/8
Y1 - 2012/11/8
N2 - Side-channel analyses allow to extract keys from devices whatever their length. They rely on tools called "distinguishers". In this paper, we intend to compare two generic distinguishers per se: we provide a characterization environment where all the implementation details are equal, hence a fair comparison. In the field of distinguishers that use a model, the notion of equivalence between distinguishers has already been studied in some seminal works [6,13]. However, no such work has been carried out for generic distinguishers, that work on observable values distributions rather than on their values themselves. In this paper, we set up simulations that aim at showing experimentally that two generic distinguishers are different. Then, we develop a theory to actually prove that one distinguisher is better than the other.
AB - Side-channel analyses allow to extract keys from devices whatever their length. They rely on tools called "distinguishers". In this paper, we intend to compare two generic distinguishers per se: we provide a characterization environment where all the implementation details are equal, hence a fair comparison. In the field of distinguishers that use a model, the notion of equivalence between distinguishers has already been studied in some seminal works [6,13]. However, no such work has been carried out for generic distinguishers, that work on observable values distributions rather than on their values themselves. In this paper, we set up simulations that aim at showing experimentally that two generic distinguishers are different. Then, we develop a theory to actually prove that one distinguisher is better than the other.
KW - Information Theoretic (IT) metrics
KW - Inter-class Kolmogorov-Smirnov Analysis (IKSA)
KW - Kolmogorov-Smirnov Analysis (KSA)
KW - Masking
KW - Probability/Cumulative Density Function (PDF/CDF)
U2 - 10.1007/978-3-642-34129-8_30
DO - 10.1007/978-3-642-34129-8_30
M3 - Conference contribution
AN - SCOPUS:84868322895
SN - 9783642341281
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 331
EP - 340
BT - Information and Communications Security - 14th International Conference, ICICS 2012, Proceedings
T2 - 14th International Conference on Information and Communications Security, ICICS 2012
Y2 - 29 October 2012 through 31 October 2012
ER -