Cargando…

Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks †

In this paper, we propose a new theoretical security model for Shannon cipher systems under side-channel attacks, where the adversary is not only allowed to collect ciphertexts by eavesdropping the public communication channel but is also allowed to collect the physical information leaked by the dev...

Descripción completa

Detalles Bibliográficos
Autores principales: Santoso, Bagus, Oohama, Yasutada
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7514958/
https://www.ncbi.nlm.nih.gov/pubmed/33267183
http://dx.doi.org/10.3390/e21050469
_version_ 1783586707812122624
author Santoso, Bagus
Oohama, Yasutada
author_facet Santoso, Bagus
Oohama, Yasutada
author_sort Santoso, Bagus
collection PubMed
description In this paper, we propose a new theoretical security model for Shannon cipher systems under side-channel attacks, where the adversary is not only allowed to collect ciphertexts by eavesdropping the public communication channel but is also allowed to collect the physical information leaked by the devices where the cipher system is implemented on, such as running time, power consumption, electromagnetic radiation, etc. Our model is very robust as it does not depend on the kind of physical information leaked by the devices. We also prove that in the case of one-time pad encryption, we can strengthen the secrecy/security of the cipher system by using an appropriate affine encoder. More precisely, we prove that for any distribution of the secret keys and any measurement device used for collecting the physical information, we can derive an achievable rate region for reliability and security such that if we compress the ciphertext using an affine encoder with a rate within the achievable rate region, then: (1) anyone with a secret key will be able to decrypt and decode the ciphertext correctly, but (2) any adversary who obtains the ciphertext and also the side physical information will not be able to obtain any information about the hidden source as long as the leaked physical information is encoded with a rate within the rate region. We derive our result by adapting the framework of the one helper source coding problem posed and investigated by Ahlswede and Körner (1975) and Wyner (1975). For reliability and security, we obtain our result by combining the result of Csizár (1982) on universal coding for a single source using linear codes and the exponential strong converse theorem of Oohama (2015) for the one helper source coding problem.
format Online
Article
Text
id pubmed-7514958
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-75149582020-11-09 Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks † Santoso, Bagus Oohama, Yasutada Entropy (Basel) Article In this paper, we propose a new theoretical security model for Shannon cipher systems under side-channel attacks, where the adversary is not only allowed to collect ciphertexts by eavesdropping the public communication channel but is also allowed to collect the physical information leaked by the devices where the cipher system is implemented on, such as running time, power consumption, electromagnetic radiation, etc. Our model is very robust as it does not depend on the kind of physical information leaked by the devices. We also prove that in the case of one-time pad encryption, we can strengthen the secrecy/security of the cipher system by using an appropriate affine encoder. More precisely, we prove that for any distribution of the secret keys and any measurement device used for collecting the physical information, we can derive an achievable rate region for reliability and security such that if we compress the ciphertext using an affine encoder with a rate within the achievable rate region, then: (1) anyone with a secret key will be able to decrypt and decode the ciphertext correctly, but (2) any adversary who obtains the ciphertext and also the side physical information will not be able to obtain any information about the hidden source as long as the leaked physical information is encoded with a rate within the rate region. We derive our result by adapting the framework of the one helper source coding problem posed and investigated by Ahlswede and Körner (1975) and Wyner (1975). For reliability and security, we obtain our result by combining the result of Csizár (1982) on universal coding for a single source using linear codes and the exponential strong converse theorem of Oohama (2015) for the one helper source coding problem. MDPI 2019-05-05 /pmc/articles/PMC7514958/ /pubmed/33267183 http://dx.doi.org/10.3390/e21050469 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Santoso, Bagus
Oohama, Yasutada
Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks †
title Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks †
title_full Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks †
title_fullStr Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks †
title_full_unstemmed Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks †
title_short Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks †
title_sort information theoretic security for shannon cipher system under side-channel attacks †
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7514958/
https://www.ncbi.nlm.nih.gov/pubmed/33267183
http://dx.doi.org/10.3390/e21050469
work_keys_str_mv AT santosobagus informationtheoreticsecurityforshannonciphersystemundersidechannelattacks
AT oohamayasutada informationtheoreticsecurityforshannonciphersystemundersidechannelattacks