May 11, 2023, 1:10 a.m. | Julien Béguinot, Yi Liu, Olivier Rioul, Wei Cheng, Sylvain Guilley

cs.CR updates on arXiv.org arxiv.org

A common countermeasure against side-channel attacks on secret key
cryptographic implementations is $d$th-order masking, which splits each
sensitive variable into $d+1$ random shares. In this paper, maximal leakage
bounds on the probability of success of any side-channel attack are derived for
any masking order. Maximal leakage (Sibson's information of order infinity) is
evaluated between the sensitive variable and the noisy leakage, and is related
to the conditional ``min-entropy'' (Arimoto's entropy of order infinity) of the
sensitive variable given the leakage. …

attack attacks channel entropy key masking order random secret secret key side-channel side-channel attack side-channel attacks variable

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Officer Hospital Laguna Beach

@ Allied Universal | Laguna Beach, CA, United States

Sr. Cloud DevSecOps Engineer

@ Oracle | NOIDA, UTTAR PRADESH, India

Cloud Operations Security Engineer

@ Elekta | Crawley - Cornerstone

Cybersecurity – Senior Information System Security Manager (ISSM)

@ Boeing | USA - Seal Beach, CA

Engineering -- Tech Risk -- Security Architecture -- VP -- Dallas

@ Goldman Sachs | Dallas, Texas, United States