Next Article in Journal
Mechanical Fault Diagnosis of a DC Motor Utilizing United Variational Mode Decomposition, SampEn, and Random Forest-SPRINT Algorithm Classifiers
Previous Article in Journal
Time-Frequency Analysis of Cardiovascular and Cardiorespiratory Interactions During Orthostatic Stress by Extended Partial Directed Coherence
Previous Article in Special Issue
Exponential Strong Converse for Successive Refinement with Causal Decoder Side Information
Article Menu
Issue 5 (May) cover image

Export Article

Open AccessArticle

Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks

University of Electro-Communications, 1-5-1 Chofugaoka, Tokyo 182-8585, Japan
*
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published in Oohama, Y.; Santoso, B. Information theoretical analysis of side-channel attacks to the Shannon cipher system. In Proceedings of the 2018 IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, 17–22 June 2018; pp. 581–585.
These authors contributed equally to this work.
Entropy 2019, 21(5), 469; https://doi.org/10.3390/e21050469
Received: 11 March 2019 / Revised: 24 April 2019 / Accepted: 29 April 2019 / Published: 5 May 2019
(This article belongs to the Special Issue Multiuser Information Theory II)
  |  
PDF [1227 KB, uploaded 20 May 2019]
  |  

Abstract

In this paper, we propose a new theoretical security model for Shannon cipher systems under side-channel attacks, where the adversary is not only allowed to collect ciphertexts by eavesdropping the public communication channel but is also allowed to collect the physical information leaked by the devices where the cipher system is implemented on, such as running time, power consumption, electromagnetic radiation, etc. Our model is very robust as it does not depend on the kind of physical information leaked by the devices. We also prove that in the case of one-time pad encryption, we can strengthen the secrecy/security of the cipher system by using an appropriate affine encoder. More precisely, we prove that for any distribution of the secret keys and any measurement device used for collecting the physical information, we can derive an achievable rate region for reliability and security such that if we compress the ciphertext using an affine encoder with a rate within the achievable rate region, then: (1) anyone with a secret key will be able to decrypt and decode the ciphertext correctly, but (2) any adversary who obtains the ciphertext and also the side physical information will not be able to obtain any information about the hidden source as long as the leaked physical information is encoded with a rate within the rate region. We derive our result by adapting the framework of the one helper source coding problem posed and investigated by Ahlswede and Körner (1975) and Wyner (1975). For reliability and security, we obtain our result by combining the result of Csizár (1982) on universal coding for a single source using linear codes and the exponential strong converse theorem of Oohama (2015) for the one helper source coding problem. View Full-Text
Keywords: information theoretic security; side-channel attacks; Shannon cipher system; one helper source coding problem; strong converse theorem information theoretic security; side-channel attacks; Shannon cipher system; one helper source coding problem; strong converse theorem
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Santoso, B.; Oohama, Y. Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks . Entropy 2019, 21, 469.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Entropy EISSN 1099-4300 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top