Title | Information Theoretical Analysis of Side-Channel Attacks to the Shannon Cipher System |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Oohama, Y., Santoso, B. |
Conference Name | 2018 IEEE International Symposium on Information Theory (ISIT) |
Keywords | bounded storage eavesdropper, Ciphers, Communication channels, composability, compositionality, cryptography, Decoding, distributed sensors, exponential strong converse theorem, information theoretical analysis, Information theory, one helper source coding problem, privacy, pubcrawl, Random variables, secrecy bounds, Shannon cipher system, side channel-attacks, side-channel attacks, signal estimation, source coding, telecommunication security, theoretical cryptography, Zinc |
Abstract | We study side-channel attacks for the Shannon cipher system. To pose side channel-attacks to the Shannon cipher system, we regard them as a signal estimation via encoded data from two distributed sensors. This can be formulated as the one helper source coding problem posed and investigated by Ahlswede, Korner(1975), and Wyner(1975). We further investigate the posed problem to derive new secrecy bounds. Our results are derived by a coupling of the result Watanabe and Oohama(2012) obtained on bounded storage eavesdropper with the exponential strong converse theorem Oohama(2015) established for the one helper source coding problem. |
DOI | 10.1109/ISIT.2018.8437666 |
Citation Key | oohama_information_2018 |