Cargando…

Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks †

In this paper, we propose a theoretical framework to analyze the secure communication problem for broadcasting two encrypted sources in the presence of an adversary which launches side-channel attacks. The adversary is not only allowed to eavesdrop the ciphertexts in the public communication channel...

Descripción completa

Detalles Bibliográficos
Autores principales: Santoso, Bagus, Oohama, Yasutada
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7515311/
https://www.ncbi.nlm.nih.gov/pubmed/33267494
http://dx.doi.org/10.3390/e21080781
_version_ 1783586788071178240
author Santoso, Bagus
Oohama, Yasutada
author_facet Santoso, Bagus
Oohama, Yasutada
author_sort Santoso, Bagus
collection PubMed
description In this paper, we propose a theoretical framework to analyze the secure communication problem for broadcasting two encrypted sources in the presence of an adversary which launches side-channel attacks. The adversary is not only allowed to eavesdrop the ciphertexts in the public communication channel, but is also allowed to gather additional information on the secret keys via the side-channels, physical phenomenon leaked by the encryption devices during the encryption process, such as the fluctuations of power consumption, heat, or electromagnetic radiation generated by the encryption devices. Based on our framework, we propose a countermeasure against such adversary by using the post-encryption-compression (PEC) paradigm, in the case of one-time-pad encryption. We implement the PEC paradigm using affine encoders constructed from linear encoders and derive the explicit the sufficient conditions to attain the exponential decay of the information leakage as the block lengths of encrypted sources become large. One interesting feature of the proposed countermeasure is that its performance is independent from the type of side information leaked by the encryption devices.
format Online
Article
Text
id pubmed-7515311
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-75153112020-11-09 Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks † Santoso, Bagus Oohama, Yasutada Entropy (Basel) Article In this paper, we propose a theoretical framework to analyze the secure communication problem for broadcasting two encrypted sources in the presence of an adversary which launches side-channel attacks. The adversary is not only allowed to eavesdrop the ciphertexts in the public communication channel, but is also allowed to gather additional information on the secret keys via the side-channels, physical phenomenon leaked by the encryption devices during the encryption process, such as the fluctuations of power consumption, heat, or electromagnetic radiation generated by the encryption devices. Based on our framework, we propose a countermeasure against such adversary by using the post-encryption-compression (PEC) paradigm, in the case of one-time-pad encryption. We implement the PEC paradigm using affine encoders constructed from linear encoders and derive the explicit the sufficient conditions to attain the exponential decay of the information leakage as the block lengths of encrypted sources become large. One interesting feature of the proposed countermeasure is that its performance is independent from the type of side information leaked by the encryption devices. MDPI 2019-08-09 /pmc/articles/PMC7515311/ /pubmed/33267494 http://dx.doi.org/10.3390/e21080781 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Santoso, Bagus
Oohama, Yasutada
Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks †
title Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks †
title_full Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks †
title_fullStr Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks †
title_full_unstemmed Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks †
title_short Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks †
title_sort information theoretic security for broadcasting of two encrypted sources under side-channel attacks †
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7515311/
https://www.ncbi.nlm.nih.gov/pubmed/33267494
http://dx.doi.org/10.3390/e21080781
work_keys_str_mv AT santosobagus informationtheoreticsecurityforbroadcastingoftwoencryptedsourcesundersidechannelattacks
AT oohamayasutada informationtheoreticsecurityforbroadcastingoftwoencryptedsourcesundersidechannelattacks