Visible to the public Information Theoretical Analysis of Side-Channel Attacks to the Shannon Cipher System

TitleInformation Theoretical Analysis of Side-Channel Attacks to the Shannon Cipher System
Publication TypeConference Paper
Year of Publication2018
AuthorsOohama, Y., Santoso, B.
Conference Name2018 IEEE International Symposium on Information Theory (ISIT)
Keywordsbounded storage eavesdropper, Ciphers, Communication channels, composability, compositionality, cryptography, Decoding, distributed sensors, exponential strong converse theorem, information theoretical analysis, Information theory, one helper source coding problem, privacy, pubcrawl, Random variables, secrecy bounds, Shannon cipher system, side channel-attacks, side-channel attacks, signal estimation, source coding, telecommunication security, theoretical cryptography, Zinc
AbstractWe study side-channel attacks for the Shannon cipher system. To pose side channel-attacks to the Shannon cipher system, we regard them as a signal estimation via encoded data from two distributed sensors. This can be formulated as the one helper source coding problem posed and investigated by Ahlswede, Korner(1975), and Wyner(1975). We further investigate the posed problem to derive new secrecy bounds. Our results are derived by a coupling of the result Watanabe and Oohama(2012) obtained on bounded storage eavesdropper with the exponential strong converse theorem Oohama(2015) established for the one helper source coding problem.
DOI10.1109/ISIT.2018.8437666
Citation Keyoohama_information_2018