2019
DOI: 10.3390/e21050469
|View full text |Cite
|
Sign up to set email alerts
|

Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks †

Abstract: In this paper, we propose a new theoretical security model for Shannon cipher systems under side-channel attacks, where the adversary is not only allowed to collect ciphertexts by eavesdropping the public communication channel but is also allowed to collect the physical information leaked by the devices where the cipher system is implemented on, such as running time, power consumption, electromagnetic radiation, etc. Our model is very robust as it does not depend on the kind of physical information leaked by t… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 27 publications
0
8
0
Order By: Relevance
“…We can prove Lemma 4 using a similar method shown in [ 4 ]. The detailed proof is given in Appendix C .…”
Section: Proofs Of the Main Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…We can prove Lemma 4 using a similar method shown in [ 4 ]. The detailed proof is given in Appendix C .…”
Section: Proofs Of the Main Resultsmentioning
confidence: 99%
“…The adversarial/security model we use in this paper and its relation to a real-world example are shown in Figure 1 . Basically, we adapt the approach in [ 4 ] on modeling the side-channel, where the side-channel is modelled as a rate constraint noiseless channel.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Recently, Watanabe and Oohama [ 17 ] have found an interesting security problem, which has a close connection with the strong converse theorem for the AKW system. Furthermore, Oohama and Santoso [ 18 ] and Santoso and Oohama [ 19 ] clarify that the exponential strong converse theorem obtained by this paper plays an essential role in deriving a strong sufficient secure condition for the privacy amplification in their new theoritical model of side channel attacks to the Shannon chipher systems. From the above two cases, we expect that exponential strong converse theorems for multiterminal source networks will serve as a strong tool to several information theoretical security problems.…”
Section: Introductionmentioning
confidence: 84%