Abstract
In this paper, we propose a new theoretical security model for Shannon cipher systems under side-channel attacks, where the adversary is not only allowed to collect ciphertexts by eavesdropping the public communication channel but is also allowed to collect the physical information leaked by the devices where the cipher system is implemented on, such as running time, power consumption, electromagnetic radiation, etc. Our model is very robust as it does not depend on the kind of physical information leaked by the devices. We also prove that in the case of one-time pad encryption, we can strengthen the secrecy/security of the cipher system by using an appropriate affine encoder. More precisely, we prove that for any distribution of the secret keys and any measurement device used for collecting the physical information, we can derive an achievable rate region for reliability and security such that if we compress the ciphertext using an affine encoder with a rate within the achievable rate region, then: (1) anyone with a secret key will be able to decrypt and decode the ciphertext correctly, but (2) any adversary who obtains the ciphertext and also the side physical information will not be able to obtain any information about the hidden source as long as the leaked physical information is encoded with a rate within the rate region. We derive our result by adapting the framework of the one helper source coding problem posed and investigated by Ahlswede and Körner (1975) and Wyner (1975). For reliability and security, we obtain our result by combining the result of Csizár (1982) on universal coding for a single source using linear codes and the exponential strong converse theorem of Oohama (2015) for the one helper source coding problem.
Keywords: information theoretic security, side-channel attacks, Shannon cipher system, one helper source coding problem, strong converse theorem
1. Introduction
In most of theoretical security models for encryption schemes, the adversary only obtains information from the public communication channel. In such models, an adversary is often treated as an entity that tries to obtain information about the hidden source only from the ciphertexts that are sent through the public communication channel. However, in the real world, the encryption schemes are implemented on physical electronic devices, and it is widely known that any process executed in an electronic circuit will generate a certain kind of correlated physical phenomena as “side” effects, according to the type of process. For example, differences in inputs to a process in an electronic circuit can induce differences in the heat, power consumption, and electromagnetic radiation generated as byproducts by the devices. Therefore, we may consider that an adversary who has a certain degree of physical access to the devices may obtain some information on very sensitive hidden data, such as the keys used for the encryption, just by measuring the generated physical phenomena using appropriate measurement devices. More precisely, an adversary may deduce the value of the bits of the key by measuring the differences in the timing of the process of encryption or the differences in the power consumption, electromagnetic radiation, and other physical phenomena. This information channel where the adversary obtains data in the form of physical phenomena is called the side-channel, and attacks using the side-channel are known as side-channel attacks.
In the literature, there have been many works showing that adversaries have succeeded in breaking the security of cryptographic systems by exploiting side-channel information such as running time, power consumption, and electromagnetic radiation in the real physical world [1,2,3,4,5].
1.1. Our Contributions
1.1.1. Security Model for Side-Channel Attacks
In this paper, we propose a security model where the adversary attempts to obtain information about the hidden source by collecting data from (1) the public communication channel in the form of ciphertexts, and (2) the side-channel in the form of some physical data related to the encryption keys. Our proposed security model is illustrated in Figure 1.
Figure 1.
Illustration of side-channel attacks.
Based on the security model illustrated above, we formulate a security problem of strengthening the security of Shannon cipher system where the encryption is implemented on a physical encryption device and the adversary attempts to obtain some information on the hidden source by collecting ciphertexts and performing side-channel attacks.
We describe our security model in a more formal way as follows. The source X is encrypted using an encryption device with secret key K installed. The result of the encryption, i.e., ciphertext C, is sent through a public communication channel to a data center where C is decrypted back into the source X using the same key K. The adversary is allowed to obtain C from the public communication channel and is also equipped with an encoding device that encodes and processes the noisy large alphabet data Z, i.e., the measurement result of the physical information obtained from the side-channel, into the appropriate binary data . It should be noted that in our model, we do not put any limitation on the kind of physical information measured by the adversary. Hence, any theoretical result based on this model automatically applies to any kind of side-channel attack, including timing analysis, power analysis, and electromagnetic (EM) analysis. In addition, the measurement device may just be a simple analog-to-digital converter that converts the analog data representing physical information leaked from the device into “noisy” digital data Z. In our model, we represent the measurement process as a communication channel W.
1.1.2. Main Result
As the main theoretical result, we show that we can strengthen the secrecy/security of the Shannon cipher implemented on a physical device against an adversary who collects the ciphertexts and launches side-channel attacks by a simple method of compressing the ciphertext C from a Shannon cipher using an affine encoder into before releasing it into the public communication channel.
We prove that in the case of one-time pad encryption, we can strengthen the secrecy/security of the cipher system by using an appropriate affine encoder. More precisely, we prove that for any distribution of the secret key K and any measurement device (used to convert the physical information from a side-channel into the noisy large alphabet data Z), we can derive an achievable rate region for such that if we compress the ciphertext C into using the affine encoder , which has an encoding rate R inside the achievable region, then we can achieve reliability and security in the following sense:
anyone with secret key K can construct an appropriate decoder that decrypts and encodes with exponentially decaying error probability, but
the amount of information gained by any adversary who obtains the compressed ciphertext and encoded physical information is exponentially decaying to zero as long as the encoding device encodes the side physical information into with a rate within the achievable rate region.
By utilizing the homomorphic property of one-time-pad and affine encoding, we are able to separate the theoretical analysis of reliability and security such that we can deal with each issue independently. For reliability, we mainly obtain our result by using the result of Csizár [6] on the universal coding for a single source using linear codes. For the security analysis, we derive our result by adapting the framework of the one helper source coding problem posed and investigated by Ahlswede, Körner [7] and Wyner [8]. Specifically, in order to derive the secrecy exponent, we utilize the exponential strong converse theorem of Oohama [9] for the one helper source coding problem. In [10], Watanabe and Oohama deal with a similar source coding problem, but their result is insufficient for deriving the lower bound of the secrecy exponent. We will explain the relation between our method and previous related works in more detail in Section 4.
1.2. Comparison to Existing Models of Side-Channel Attacks
The most important feature of our model is that we do not make any assumption about the type or characteristics of the physical information that is measured by the adversary. Several theoretical models analyzing the security of a cryptographic system against side-channel attacks have been proposed in the literature. However, most of the existing works are applicable only for specific characteristics of the leaked physical information. For example, Brier et al. [1] and Coron et al. [11] propose a statistical model for side-channel attacks using the information from power consumption and the running time, whereas Agrawal et al. [5] propose a statistical model for side-channel attacks using electromagnetic (EM) radiations. A more general model for side-channel attacks is proposed by Köpf et al. [12] and Backes et al. [13], but they are heavily dependent upon implementation on certain specific devices. Micali et al. [14] propose a very general security model to capture the side-channel attacks, but they fail to offer any hint of how to build a concrete countermeasure against the side-channel attacks. The closest existing model to ours is the general framework for analyzing side-channel attacks proposed by Standaert et al. [15]. The authors of [15] propose a countermeasure against side-channel attacks that is different from ours, i.e., noise insertion on implementation. It should be noted that the noise insertion countermeasure proposed by [15] is dependent on the characteristics of the leaked physical information. On the other hand, our countermeasure, i.e., compression using an affine encoder, is independent of the characteristics of the leaked physical information.
1.3. Comparison to Encoding before Encryption
In this paper, our proposed solution is to perform additional encoding in the form of compression after the encryption process. Our aim is that by compressing the ciphertext, we compress the key “indirectly” and increase the “flatness” of the key used in the compressed ciphertext () such that the adversary will not get much additional information from eavesdropping on the compressed ciphertext (). Instead of performing the encoding after encryption, one may consider performing the encoding before encryption, i.e., encoding the source and the key “directly” before performing the encryption. However, since we need to apply two separate encodings on the source and the key, we can expect that the implementation cost is more expensive than our proposed solution, i.e., approximately double the cost of applying our proposed solution. Moreover, it is not completely clear whether our security analysis still applies for this case. For example, if the adversary performs the side-channel attacks on the key after it is encoded (before encryption), we need a complete remodeling of the security problem.
1.4. Organization of this Paper
This paper is structured as follows. In Section 2, we show the basic notations and definitions that we use throughout this paper, and we also describe the formal formulations of our model and the security problem. In Section 3, we explain the idea and the formulation of our proposed solution. In Section 4, we explain the relation between our formulation and previous related works. Based on this, we explain the theoretical challenge which we have to overcome to prove that our proposed solution is sound. In Section 5, we state our main theorem on the reliability and security of our solution. In Section 6, we show the proof of our main theorem. We put the proofs of other related propositions, lemmas, and theorems in the appendix.
2. Problem Formulation
In this section, we will introduce the general notations used throughout this paper and provide a description of the basic problem we are focusing on, i.e., side-channel attacks on Shannon cipher systems. We also explain the basic framework of the solution that we consider to solve the problem. Finally, we state the formulation of the reliability and security problem that we consider and aim to solve in this paper.
2.1. Preliminaries
In this subsection, we show the basic notations and related consensus used in this paper.
Random Source of Information and Key: Let X be a random variable from a finite set . Let be a stationary discrete memoryless source (DMS) such that for each , takes values in the finite set and obeys the same distribution as that of X denoted by . The stationary DMS is specified with . In addition, let K be a random variable taken from the same finite set and representing the key used for encryption. Similarly, let be a stationary discrete memoryless source such that for each , takes values in the finite set and obeys the same distribution as that of K denoted by . The stationary DMS is specified with . In this paper, we assume that is the uniform distribution over .
Random Variables and Sequences: We write the sequence of random variables with length n from the information source as follows: . Similarly, strings with length n of are written as . For , stands for the probability of the occurrence of . When the information source is memoryless, specified with , the following equation holds:
In this case, we write as . Similar notations are used for other random variables and sequences.
Consensus and Notations: Without loss of generality, throughout this paper, we assume that is a finite field. The notation ⊕ is used to denote the field addition operation, while the notation ⊖ is used to denote the field subtraction operation, i.e., , for any elements . Throughout this paper, all logarithms are taken to the natural basis.
2.2. Basic System Description
In this subsection, we explain the basic system setting and the basic adversarial model we consider in this paper. First, let the information source and the key be generated independently by different parties and , respectively. In our setting, we assume the following:
The random key is generated by from a uniform distribution.
The source is generated by and is independent of the key.
Next, let the random source from be sent to the node , and let the random key from also be sent to . Further settings of our system are described as follows and are also shown in Figure 2.
- Source Processing: At the node , is encrypted with the key using the encryption function . The ciphertext of is given by
Transmission: Next, the ciphertext is sent to the information processing center through a public communication channel. Meanwhile, the key is sent to through a private communication channel.
Sink Node Processing: In , we decrypt the ciphertext using the key through the corresponding decryption procedure defined by . It is obvious that we can correctly reproduce the source output from and with the decryption function .
Figure 2.
Main problem: side-channel attacks on a Shannon cipher system.
Side-Channel Attacks by Eavesdropper Adversary: An (eavesdropper) adversary eavesdrops on the public communication channel in the system. The adversary also uses side information obtained by side-channel attacks. In this paper, we introduce a new theoretical model of side-channel attacks that is described as follows. Let be a finite set and let be a noisy channel. Let Z be a channel output from W for the random input variable K. We consider the discrete memoryless channel specified with W. Let be a random variable obtained as the channel output by connecting to the input channel. We write a conditional distribution on given as
Since the channel is memoryless, we have
| (1) |
On the above output of for the input , we assume the following:
The three random variables X, K, and Z satisfy , which implies that .
W is given in the system and the adversary cannot control W.
Through side-channel attacks, the adversary can access .
We next formulate the side information the adversary obtains by side-channel attacks. For each , let be an encoder function. Set Let
be a rate of the encoder function . For , we set
For the encoded side information the adversary obtains, we assume the following.
The adversary , having accessed , obtains the encoded additional information . For each , the adversary can design .
The sequence must be upper-bounded by a prescribed value. In other words, the adversary must use such that for some and for any sufficiently large n, .
On the Scope of Our Theoretical Model: When the is not so large, the adversary may directly access . In contrast, in a real situation of side-channel attacks, often the noisy version of can be regarded as very close to an analog random signal. In this case, is sufficiently large and the adversary cannot obtain in a lossless form. Our theoretical model can address such situations of side-channel attacks.
2.3. Solution Framework
As the basic solution framework, we consider applying a post-encryption-compression coding system. The application of this system is illustrated in Figure 3.
Encoding at Source node: We first use to encode the ciphertext . The formal definition of is . Let . Instead of sending , we send to the public communication channel.
Decoding at Sink Nodes: receives from the public communication channel. Using the common key and the decoder function , outputs an estimation of .
Figure 3.
Basic solution framework: post-encryption-compression coding system.
On Reliability and Security: From the description of our system in the previous section, the decoding process in our system above is successful if holds. Combining this and (6), it is clear that the decoding error probabilities are as follows:
Set . The information leakage on from is measured by the mutual information between and . This quantity is formally defined by
Reliable and Secure Framework:
Definition 1.
A quantity R is achievable underfor the systemif there exists a sequencesuch that, , , we have
and for any eavesdropperwithsatisfying,
Definition 2.
[Reliable and Secure Rate Region] Letdenote the set of allsuch that R is achievable under. We callthe reliable and secure rate region.
Definition 3.
A tripleis achievable underfor the systemif there exists a sequencesuch that, , , we have
and for any eavesdropperwithsatisfying, we have
Definition 4 (Rate, Reliability, and Security Region).
Letdenote the set of allsuch thatis achievable under. We callthe rate, reliability and security region.
Our aim in this paper is to find the explicit inner bounds of and .
3. Proposed Idea: Affine Encoder as a Privacy Amplifier
In order to instantiate the basic solution framework mentioned in previous section, we propose the use of an affine encoder as the compression function . We show in this section that we can easily construct an affine encoder that is suitable for our solution framework based on a linear encoder. The instantiation of the solution framework with an affine encoder is illustrated in Figure 4.
Figure 4.
Our proposed solution: affine encoders as privacy amplifiers.
Construction of the Affine Encoder: For each , let be a linear mapping. We define the mapping by
| (2) |
where A is a matrix with n rows and m columns. Entries of A are from . We fix . Define the mapping by
| (3) |
The mapping is called the affine mapping induced by the linear mapping and constant vector . By the definition of shown in (3), the following affine structure holds:
| (4) |
Next, let be the corresponding decoder for such that Note that does not have a linear structure in general.
Description of Proposed Procedure: We describe the procedure of our privacy amplified system as follows.
- Encoding of Ciphertext: First, we use to encode the ciphertext . Let . Then, instead of sending , we send to the public communication channel. By the affine structure of the encoder (shown in (4)) we have
where we set(5) - Decoding at Sink Node: First, using the linear encoder , encodes the key received through a private channel into . Receiving from the public communication channel, computes in the following way. From (5), we have that the decoder can obtain by subtracting from . Finally, outputs by applying the decoder to as follows:
(6)
Our concrete privacy-amplified system described above is illustrated in Figure 4.
Splitting of Reliability and Security
By the affine structure of the encoder function , the proposed privacy amplified system can be split into two coding problems. One is a source coding problem using a linear encoder . We hereafter call this Problem 0. The other is a privacy amplification problem using the affine encoder . We call this Problem 1. These two problems are shown in Figure 5.
Figure 5.
Two split problems: Problem 0 (Reliability) and Problem 1 (Security).
On Reliability (Problem 0): From the description of our system in the previous section, the decoding process in our system above is successful if holds. Combining this and (6), it is clear that the decoding error probability is as follows:
In Problem 0, we discuss the minimum rate R such that such that , , , we have
It is well known that this minimum is equal to when is a sequence of general (nonlinear) encoders. Csiszár [6] proved the existence of a sequence of linear encoders and nonlinear decoders such that for any satisfying , the error probability decays exponentially as . His result is stated in the next section.
On Security (Problem 1): We assume that the adversary knows defining the affine encoder . When has the affine structure shown in (4), the information leakage measured by the mutual information between and has the following form:
| (7) |
Step (a) follows from . Using (7), we upper bound to obtain the following lemma.
Lemma 1.
(8) whererepresents the uniform distribution over.
Proof.
We have the following chain of inequalities:
Step (a) follows from (7). Step (b) follows from . Step (c) follows from . □
We set
Then we have the following lemma.
Lemma 2.
For any affine encoder, we have
The quantity will play an important role in deriving an explicit upper bound of In Problem 1, we consider the privacy amplification problem using the quantity as a security criterion. In this problem, we study an explicit characterization of the region denoted by , which consists of all pairs such that such that
In the next section, we discuss two previous works related to Problem 1.
4. Previous Related Works
In this section, we introduce approaches from previous existing work related to Problem 0 (reliability) and Problem 1 (security). Our goal is that by showing these previous approaches, it will be easier to understand our approach to analyzing reliability and security. In particular, for Problem 1 (security), we explain approaches used in similar problems in previous works and highlight their differences from Problem 1.
We first state a previous result related to Problem 0. Let be an affine encoder and be a linear encoder induced by . We define a function related to an exponential upper bound of . Let be an arbitrary random variable over that has a probability distribution . Let denote the set of all probability distributions on . For and , we define the following function:
By simple computation, we can prove that takes positive values if and only if . We have the following result.
Theorem 1.
(Csiszár [6]). There exists a sequence such that for any , we have
(9) where is defined by
Note that as .
It follows from Theorem 1 that if , then the error probability of decoding decays exponentially, and its exponent is lower bounded by the quantity . Furthermore, the code is a universal code that depends only on the rate R and not on the value of .
We next state two coding problems related to Problem 1. One is a problem on the privacy amplification for the bounded storage eavesdropper posed and investigated by Watanabe and Oohama [10]. The other is the one helper source coding problem posed and investigated by Ashlswede and Körner [7] and Wyner [16]. We hereafter call the former and latter problems, respectively, Problem 2 and Problem 3. Problems 1–3 are shown in Figure 6. As we can see from this figure, these three problems are based on the same communication scheme. The classes of encoder functions and the security criteria on are different between these three problems. In Problem 1, the sequence of encoding functions is restricted to the class of affine encoders to satisfy the homomorphic property. On the other hand, in Problems 2 and 3, we have no such restriction on the class of encoder functions. In descriptions of Problems 2 and 3, we state the difference in security criteria between Problems 1, 2, and 3. A comparison of three problems in terms of and security criteria is summarized in Table 1.
Figure 6.
Three related coding problems.
Table 1.
Differences between Problems 1, 2, and 3 in terms of and security criteria.
| Problem 1 | Problem 2 | Problem 3 | |
|---|---|---|---|
| affine encoders | general | general | |
| Security Criteria |
In Problem 2, Alice and Bob share a random variable of block length n, and an eavesdropper adversary has a random variable that is correlated to . In such a situation, Alice and Bob try to distill a secret key as long as possible. In [10], they considered a situation such that the adversary’s random variable is stored in a storage that is obtained as a function value of , and the rate of the storage size is bounded. This situation makes sense when the alphabet size of the adversary’s observation is too huge to be stored directly in a storage. In such a situation, Watanabe and Oohama [10] obtained an explicit characterization of the region indicating the trade-off between the key rate and the rate of the storage size. In Problem 2, the variational distance between and is used as a security criterion instead of in Problem 1. Define
Then the formal definition of the region is given by the following:
In Problem 3, the adversary outputs an estimation of from and . Let be a decoder function of the adversary. Then is given by Let
be the error probability of decoding for Problem 3. The quantity serves as a helper for the decoding of from . In Problem 3, Ahlswede and Körner [7] and Wyner [16] investigated an explicit characterization of the rate region indicating the trade-off between and R under the condition that vanishes asymptotically. The region is formally defined by
The region was determined by Ashlswede and Körner [7] and Wyner [16]. To state their result, we define several quantities. Let U be an auxiliary random variable taking values in a finite set . We assume that the joint distribution of is
The above condition is equivalent to . Define the set of probability distribution by
Set
We can show that the region satisfies the following property.
Property 1.
- (a)
The regionis a closed convex subset of.
- (b)
For any, we have
(10) The minimum is attained by. This result implies that
Furthermore, the pointalways belongs to.
Property 1 part (a) is a well-known property. Proof of Property 1 part (b) is easy. Proofs of Property 1 parts (a) and (b) are omitted. Typical shape of the region is shown in Figure 7.
Figure 7.
Shape of the region .
The rate region was determined by Ahlswede and Körner [7] and Wyner [16]. Their result is the following.
Theorem 2.
(Ahlswede, Körner [7] andWyner [16])
Watanabe and Oohama [10] investigated an explicit form of to show that it is equal to , that is, we have the following result.
Theorem 3.
(Watanabe and Oohama [10])
In the remaining part of this section, we investigate a relationship between Problems 2 and 3 to give an outline of the proof of this theorem. Let
be the correct probability of decoding for Problem 3. The following lemma provides an important inequality to examine a relationship between these two problems.
Lemma 3.
For any, we have the following:
Proof of this lemma is given in Appendix A. Using Lemma 3, we can easily prove the inclusion , which corresponds to the converse part of Theorem 3.
Proof of:
We assume that . Then there exists such that ,
(11)
(12) From the above sequence , we can construct the sequence such that
(13)
(14) Set . Then from (14) and Lemma 3, we have
from which we have
(15) for sufficiently large n. From (13), (15), and the definition of , we can see that , or equivalent to
(16) where we set . Since is arbitrary, we have that
(17) By letting in (17) and considering that is an open set, we have that . □
To prove , we examine an upper bound of . For , we define
According to Watanabe and Oohama [10], we have the following two propositions.
Proposition 1.
(Watanabe and Oohama [10]). Fix any positive . satisfying , we have
Proposition 2.
(Watanabe and Oohama [10]). If , then for any and any , we have
which implies that
The inclusion immediately follows from Propositions 1 and 2.
5. Reliability and Security Analysis
In this section, we state our main results. We use the affine encoder defined in the previous section. We upper bound and to obtain inner bounds of and .
Let
Then we have the following proposition.
Proposition 3.
For anyand any, there exists a sequence of mappingssuch that for any, we have
(18) and for any eavesdropperwithsatisfying, we have
(19)
This proposition can be proved by several tools developed by previous works. The detail of the proof is given in the next section. As we stated in Proposition 2, Watanabe and Oohama [10] proved that if , then the quantity for any and any , the quantity . Their method can not be applied to the analysis of since the quantity is multiplied with the quantity in the definition of . In this paper, we derive an upper bound of that decays exponentially as if . To derive the upper bound, we use a new method that is developed by Oohama to prove strong converse theorems in multi-terminal source or channel networks [9,17,18,19,20].
We define several functions and sets to describe the upper bound of . Set
For and for , define
We next define a function serving as a lower bound of . For each , define
Furthermore, set
We can show that the above functions satisfy the following property.
Property 2.
- (a)
The cardinality boundinis sufficient to describe the quantity. Furthermore, the cardinality boundinis sufficient to describe the quantity.
- (b)
For any, we have
- (c)
For anyand any, we have
(20) - (d)
Fix anyand. For, we define a probability distributionby
Then for, is twice differentiable. Furthermore, for, we have
The second equality implies thatis a concave function of.
- (e)
For, defineand set
Then we have. Furthermore, for any, we have
- (f)
For every, the conditionimplieswhere g is the inverse function of.
Proof of this property is found in Oohama [9] (extended version). On the upper bound of , we have the following:
Proposition 4.
For any, we have
(21)
Proof of this proposition is given in the next section. Proposition 4 has a close connection with the one helper source coding problem, which is explained as Problem 3 in the previous section. In fact, for the proof we use the result Oohama [9] obtained for an explicit lower bound of the optimal exponent on the exponential decay of for . By Propositions 3 and 4, we obtain our main result shown below.
Theorem 4.
For any and any , there exists a sequence of mappings such that for any , we have
(22) and for any eavesdropper with satisfying , we have
(23) where are defined by
Note that for , as .
The functions and take positive values if and only if belongs to the set
Thus, by Theorem 4, under we have the following:
In terms of reliability, goes to zero exponentially as n tends to infinity, and its exponent is lower bounded by the function .
In terms of security, for any satisfying , the information leakage on goes to zero exponentially as n tends to infinity, and its exponent is lower bounded by the function .
The code that attains the exponent functions is the universal code that depends only on R and not on the value of the distribution .
Define
From Theorem 4, we immediately obtain the following corollary.
Corollary 1.
A typical shape of is shown in Figure 8.
Figure 8.
The inner bound of the reliable and secure rate region .
6. Proofs of the Results
In this section, we prove our main theorem, i.e., Theorem 4.
6.1. Types of Sequences and Their Properties
In this subsection, we present basic results on the types. These results are basic tools for our analysis of several bounds related to the error provability of decoding or security.
Definition 5.
For any n-sequence , denotes the number of t such that . The relative frequency of the components of is called the type of denoted by . The set that consists of all the types on is denoted by . Let denote an arbitrary random variable whose distribution belongs to . For , set
For sets of types and joint types, the following lemma holds. For details of the proof, see Csiszár and Körner [21].
Lemma 4.
- (a)
- (b)
For ,
- (c)
For ,
By Lemma 4 parts (b) and (c), we immediately obtain the following lemma:
Lemma 5.
For ,
6.2. Upper Bounds of , and
In this subsection, we evaluate upper bounds of and . For , we derive an upper bound that can be characterized with a quantity depending on and type of sequences . We first evaluate . For and , we define the following functions:
Then we have the following lemma.
Lemma 6.
In the proposed system, for any pair of , we have
(24)
Proof.
We have the following chain of inequalities:
Step (a) follows from the definition of . Step (b) follows from the probabilities for taking an identical value. Step (c) follows from the definition of . Step (d) follows from Lemma 5. □
6.3. Random Coding Arguments
We construct a pair of affine encoders using the random coding method. For the joint decoder , we propose the minimum entropy decoder used in Csiszár [6] and Oohama and Han [22].
Random Construction of Affine Encoders: We first choose m such that
where stands for the integer part of a. It is obvious that
By definition (2) of , we have that for ,
where A is a matrix with n rows and m columns. By definition (3) of , we have that for ,
where is a vector with m columns. Entries of A and are from the field of . These entries are selected at random, independently of each other, and with a uniform distribution. Randomly constructed linear encoder and affine encoder have three properties shown in the following lemma.
Lemma 7 (Properties of Linear/Affine Encoders).
- (a)
For any with , we have
(25) - (b)
For any and for any , we have
(26) - (c)
For any with , and for any , we have
(27)
Proof of this lemma is given in Appendix B. We next define the decoder function To this end, we define the following quantities.
Definition 6.
For , we denote the entropy calculated from the type by . In other words, for a type such that , we define .
Minimum Entropy Decoder: For , we define the decoder function as follows:
Error Probability Bound: In the following arguments, we let expectations based on the random choice of the affine encoder be denoted by [. Define
Then we have the following lemma.
Lemma 8.
For any n and for any,
Proof of this lemma is given in Appendix C.
Estimation of Approximation Error: Define
Then we have the following lemma.
Lemma 9.
For anysatisfying, we have
(28)
Proof of this lemma is given in Appendix D. From the bound (28) in Lemma (9), we know that the quantity serves as an upper bound of the ensemble average of the conditional divergence Hayashi [23] obtained the same upper bound of the ensemble average of the conditional divergence for an ensemble of universal functions. In this paper, we prove the bound (28) for an ensemble of affine encoders. To derive this bound, we need to use Lemma 7 parts (b) and (c), the two important properties that a class of random affine encoders satisfies. From Lemmas 1 and 9, we have the following corollary.
Corollary 2.
Existence of Good Universal Code :
From Lemma 8 and Corollary 2, we have the following lemma stating the existence of a good universal code .
Lemma 10.
There exists at least one deterministic codesatisfying, such that for any,
Furthermore, for any, we have
Proof.
We have the following chain of inequalities:
Step (a) follows from Lemma 8 and Corollary 2. Step (b) follows from Lemma 4 part (a). Hence, there exists at least one deterministic code such that
from which we have that
for any . Furthermore, we have that for any ,
completing the proof. □
Proposition 5.
For anyand any, there exists a sequence of mappingssuch that for any, we have
(29) and for any eavesdropperwithsatisfying, we have
(30)
Proof.
By Lemma 10, there exists satisfying such that for any ,
(31) Furthermore, for any ,
(32) The bound (30) in Proposition 5 has already been proven in (32). Hence, it suffices to prove the bound (29) in Proposition 5 to complete the proof. On an upper bound of , we have the following chain of inequalities:
Step (a) follows from Lemma 6 and (31). Step (b) follows from Lemma 4 part (a). □
6.4. Explicit Upper Bound of
In this subsection, we derive an explicit upper bound of that holds for any eavesdropper with satisfying . Here we recall the following definitions:
Then we have the following lemma.
Lemma 11.
For anyand for any eavesdropperwithsatisfying, we have
(33) which implies that
(34)
Proof.
We first observe that
(35) We further observe the following:
(36) Step (a) follows from . We also note that
(37) From (35), (36), and (37) we have the bound (33) in Lemma 11. □
Proof of Proposition 3:
This proposition immediately follows from Proposition 5 and Lemma 11. □
For the upper bound of , we have the following lemma.
Lemma 12.
For anyand for any eavesdropperwithsatisfying, we have, where
(38)
(39)
(40) The probability distributions appearing in the two inequalities (38) and (39) in the right members of (40) have a property that we can select them arbitrarily. In (38), we can choose any probability distributionon. In (39), we can choose any distributionon.
Proof of this lemma is given in Appendix E.
Proof of Proposition 4:
The claim of Proposition 4 is that for ,
(41) By Lemma 12 and the definition of , we have that for ,
(42) The quantity is the same as the upper bound on the correct probability of decoding for one helper source coding problem in Lemma 1 in Oohama [9] (extended version). In a manner similar to the derivation of the exponential upper bound of the correct probability of decoding for one helper source coding problem, we can prove that for any and for some , we have
(43) From (42), (43), and the definition of , we have (41). □
7. Conclusions
In this paper, we have proposed a novel security model for analyzing the security of Shannon cipher systems against an adversary that is not only eavesdropping the public communication channel to obtain ciphertexts but is also obtaining some physical information leaked by the device implementing the cipher system through side-channel attacks. We have also presented a countermeasure against such an adversary in the case of one-time pad encryption by using an affine encoder with certain properties. The main distinguishing feature of our countermeasure is that it is independent of the characteristics or the types of physical information leaked from the devices on which the cipher system is implemented.
Appendix A. Correct Probability of Decoding and Variational Distance
In this appendix, we prove Lemma 3.
For , we set
Then we have the following chain of inequalities:
completing the proof. □
Appendix B. Proof of Lemma 7
Let be the l-th low vector of the matrix A. For each , let be a random vector that represents the randomness of the choice of . Let be a random vector that represents the randomness of the choice of . We first prove part (a). Without loss of generality, we may assume . Under this assumption, we have the following:
| (A1) |
Computing , we have the following chain of equalities:
Step (a) follows from (A1). Step (b) follows from that n random vectors are independent. We next prove part b. We have the following:
| (A2) |
Computing , we have the following chain of equalities:
Step (a) follows from (A2). Step (b) follows from that n random vectors and are independent. We finally prove the part (c). We first observe that is equivalent to Without loss of generality, we may assume that . Under this assumption, we have the following:
| (A3) |
Computing , we have the following chain of equalities:
Step (a) follows from (A3). Step (b) follows from the independent property on and □
Appendix C. Proof of Lemma 8
In this appendix, we provide the proof of Lemma 8.
For simplicity of notation, we write . For we set
Using parts (a) and (b) of Lemma 4, we have following inequalities:
| (A4) |
On an upper bound of , we have the following chain of inequalities:
Step (a) follows from Lemma 7 part (a) and independent random constructions of linear encoders and . Step (b) follows from (A4) and . On the other hand we have the obvious bound . Hence we have
Hence we have
completing the proof. □
Appendix D. Proof of Lemma 9
In this appendix, we prove Lemma 9. This lemma immediately follows from the following lemma:
Lemma A1.
For any satisfying , we have
(A5)
In fact, from and (A5) in Lemma A1, we have the bound (28) in Lemma 9. Thus, we prove Lemma A1 instead of proving Lemma 9.
In the following arguments, we use the following simplified notations:
We define
Then, the conditional distribution of the random variable for given is
Define
Then the conditional divergence between and for given M is given by
| (A6) |
The quantity has the following form:
| (A7) |
The above form is useful for computing .
Proof of Lemma A1:
Taking the expectation of both sides of (A7) with respect to the random choice of the entry of the matrix A and the vector b representing the affine encoder φ, we have
(A8) To compute the expectation , we introduce an expectation operator useful for the computation. Let be an expectation operator based on the conditional probability measures . Using this expectation operator, the quantity can be written as
(A9) Note that
(A10) From (A9) and (A10), we have
(A11) Using (A7), the expectation can be written as
(A12) Applying Jensen’s inequality to the right member of (A12), we obtain the following upper bound of :
(A13) Step (a) follows from that by Lemma 7 parts (b) and (c),
From (A8), (A11), and (A13), we have the bound (A5) in Lemma A1. □
Appendix E. Proof of Lemma 12
To prove Lemma 12, we prepare a lemma. For simplicity of notation, set . Define
Furthermore, define
Then we have the following lemma.
Lemma A2.
Proof.
We first prove the first inequality.
Step (a) follows from the definition of . For the second inequality we have
Step (a) follows from the definition of . We finally prove the third inequality.
This completes the proof of Lemma A2. □
Proof of Lemma 12:
By definition, we have
Then for any satisfying we have
Hence, it suffices to show
to prove Lemma 12. We have the following chain of inequalities:
Step (a) follows from the defintion of ℘. Step (b) follows from Lemma A2. ☐
Author Contributions
Both the first and the second authors contributed for the writing of the original draft of this paper. Other contributions of the first author include (but are not limited to): the conceptualization of the research goals and aims, the validation of the results, the visualization/presentation of the works, the review and editing. Other contributions of the second author include (but are not limited to): the conceptualization of the ideas, research goals and aims, the formal analysis and the supervision.
Funding
This research was funded by Japan Society for the Promotion of Science (JSPS) Kiban (B) 18H01438 and Japan Society for the Promotion of Science (JSPS) Kiban (C) 18K11292.
Conflicts of Interest
The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.
References
- 1.Brier E., Clavier C., Olivier F. Correlation Power Analysis with a Leakage Model. In: Joye M., Quisquater J.J., editors. International Workshop on Cryptographic Hardware and Embedded Systems. Springer; Berlin/Heidelberg, Germany: 2004. pp. 16–29. [Google Scholar]
- 2.Quisquater J.J., Samyde D. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. In: Attali I., Jensen T., editors. International Conference on Research in Smart Cards. Springer; London, UK: 2001. pp. 200–210. [Google Scholar]
- 3.Kocher P.C. Annual International Cryptology Conference. Volume 1109. Springer; Berlin/Heidelberg, Germany: 1996. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems; pp. 104–113. [Google Scholar]
- 4.Kocher P.C., Jaffe J., Jun B. Lecture Notes in Computer Science. Volume 1666. Springer; Berlin/Heidelberg, Germany: 1999. Differential Power Analysis; pp. 388–397. [Google Scholar]
- 5.Agrawal D., Archambeault B., Rao J.R., Rohatgi P. The EM Side—Channel(s) In: Kaliski B.S., Koç ç.K., Paar C., editors. International Workshop on Cryptographic Hardware and Embedded Systems. Springer; Berlin/Heidelberg, Germany: 2003. pp. 29–45. [Google Scholar]
- 6.Csiszár I. Linear Codes for Sources and Source Networks: Error Exponents, Universal Coding. IEEE Trans. Inform. Theory. 1982;28:585–592. [Google Scholar]
- 7.Ahlswede R., Körner J. Source Coding with Side Information and A Converse for The Degraded Broadcast Channel. IEEE Trans. Inform. Theory. 1975;21:629–637. [Google Scholar]
- 8.Wyner A.D. The Common Information of Two Dependent Random Variables. IEEE Trans. Inform. Theory. 1975;21:163–179. [Google Scholar]
- 9.Oohama Y. Exponent function for one helper source coding problem at rates outside the rate region; Proceedings of the 2015 IEEE International Symposium on Information Theory (ISIT); Hong Kong. 14–19 June 2015; pp. 1575–1579. [Google Scholar]
- 10.Watanabe S., Oohama Y. Privacy amplification theorem for bounded storage eavesdropper; Proceedings of the 2012 IEEE Information Theory Workshop (ITW); Bangalore, India. 20–25 October 2012; pp. 177–181. [Google Scholar]
- 11.Coron J., Naccache D., Kocher P.C. Statistics and secret leakage. ACM Trans. Embed. Comput. Syst. 2004;3:492–508. [Google Scholar]
- 12.Köpf B., Basin D.A. An information-theoretic model for adaptive side-channel attacks; Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007; Alexandria, VA, USA. 28–31 January 2007; pp. 286–296. [Google Scholar]
- 13.Backes M., Köpf B. European Symposium on Research in Computer Security. Volume 5283. Springer; Berlin/Heidelberg, Germany: 2008. Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks; pp. 517–532. [Google Scholar]
- 14.Micali S., Reyzin L. Theory of Cryptography Conference. Volume 2951. Springer; Berlin/Heidelberg, Germany: 2004. Physically Observable Cryptography (Extended Abstract) pp. 278–296. [Google Scholar]
- 15.Standaert F., Malkin T., Yung M. Annual International Conference on the Theory and Applications of Cryptographic Techniques. Volume 5479. Springer; Berlin/Heidelberg, Germany: 2009. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks; pp. 443–461. [Google Scholar]
- 16.Wyner A.D. On Source Coding with Side Information at The Decoder. IEEE Trans. Inform. Theory. 1975;21:294–300. [Google Scholar]
- 17.Oohama Y. Strong converse exponent for degraded broadcast channels at rates outside the capacity region; Proceedings of the 2015 IEEE International Symposium on Information Theory (ISIT); Hong Kong, China. 14–19 June 2015; pp. 939–943. [Google Scholar]
- 18.Oohama Y. Strong converse theorems for degraded broadcast channels with feedback; Proceedings of the 2015 IEEE International Symposium on Information Theory (ISIT); Hong Kong, China. 14—19 June 2015; pp. 2510–2514. [Google Scholar]
- 19.Oohama Y. New Strong Converse for Asymmetric Broadcast Channels. arXiv. 20161604.02901 [Google Scholar]
- 20.Oohama Y. Exponential Strong Converse for Source Coding with Side Information at the Decoder. Entropy. 2018;20:352. doi: 10.3390/e20050352. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 21.Csiszár I., Körner J. Information Theory, Coding Theorems for Discrete Memoryless Systems. 2nd ed. Cambridge University Press; Cambridge, UK: 2011. [Google Scholar]
- 22.Oohama Y., Han T.S. Universal coding for the Slepian-Wolf data compression system and the strong converse theorem. IEEE Trans. Inform. Theory. 1994;40:1908–1919. [Google Scholar]
- 23.Hayashi M. Exponential Decreasing Rate of Leaked Information in Universal Random Privacy Amplification. IEEE Trans. Inform. Theory. 2011;57:3989–4001. [Google Scholar]








