{"id":9490,"date":"2013-05-30T23:28:26","date_gmt":"2013-05-30T20:28:26","guid":{"rendered":"http:\/\/hgpu.org\/?p=9490"},"modified":"2013-05-30T23:41:15","modified_gmt":"2013-05-30T20:41:15","slug":"a-comparison-of-statistical-techniques-for-detecting-side-channel-information-leakage-in-cryptographic-devices","status":"publish","type":"post","link":"https:\/\/hgpu.org\/?p=9490","title":{"rendered":"A Comparison of Statistical Techniques for Detecting Side-Channel Information Leakage in Cryptographic Devices"},"content":{"rendered":"<p>The development of a standardised testing methodology for side-channel resistance of cryptographic devices is an issue that has received recent focus from standardisation bodies such as NIST. Statistical techniques such as hypothesis and significance testing appear to be ideally suited for this purpose. In this work we evaluate the candidacy of three such tests: a emph{t}-test proposed by Cryptography Research Inc., and two mutual information-based tests. We compare the detection tests in a theoretical setting by conducting an emph{a priori} statistical power analysis, covering previously unforeseen problems arising from multiple hypothesis testing, and analyse the practical application of the tests through a case study using an implementation of the AES on an ARM7 microcontroller, demonstrating a trade-off between test genericity and data and computational complexity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The development of a standardised testing methodology for side-channel resistance of cryptographic devices is an issue that has received recent focus from standardisation bodies such as NIST. Statistical techniques such as hypothesis and significance testing appear to be ideally suited for this purpose. In this work we evaluate the candidacy of three such tests: a [&hellip;]<\/p>\n","protected":false},"author":351,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[11,90,3,287],"tags":[7,1307,659,1782,1793,1800],"class_list":["post-9490","post","type-post","status-publish","format-standard","hentry","category-computer-science","category-opencl","category-paper","category-security","tag-ati","tag-ati-radeon-hd-7970","tag-computational-complexity","tag-computer-science","tag-opencl","tag-security"],"views":2409,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/posts\/9490","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/users\/351"}],"replies":[{"embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9490"}],"version-history":[{"count":1,"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/posts\/9490\/revisions"}],"predecessor-version":[{"id":9492,"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/posts\/9490\/revisions\/9492"}],"wp:attachment":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9490"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9490"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9490"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}