Universal Coding for Shannon Ciphers under Side-Channel Attacks (2302.01314v3)
Abstract: We study the universal coding under side-channel attacks posed and investigated by Oohama and Santoso (2022). They proposed a theoretical security model for Shannon cipher system under side-channel attacks, where the adversary is not only allowed to collect ciphertexts by eavesdropping the public communication channel, but is also allowed to collect the physical information leaked by the devices where the cipher system is implemented on such as running time, power consumption, electromagnetic radiation, etc. For any distributions of the plain text, any noisy channels through which the adversary observe the corrupted version of the key, and any measurement device used for collecting the physical information, we can derive an achievable rate region for reliability and security such that if we compress the ciphertext with rate within the achievable rate region, then: (1) anyone with secret key will be able to decrypt and decode the ciphertext correctly, but (2) any adversary who obtains the ciphertext and also the side physical information will not be able to obtain any information about the hidden source as long as the leaked physical information is encoded with a rate within the rate region.
- Y. Oohama and B. Santoso, “A framework for Shannon ciphers under side-channel attacks: a strong converse and more,” in IEEE International Symposium on Information Theory, ISIT 2022, Espoo, Finland, June 26 - July 1, 2022. IEEE, 2022, pp. 862–867. [Online]. Available: https://doi.org/10.1109/ISIT50566.2022.9834899
- B. Santoso and Y. Oohama, “Information theoretic security for Shannon cipher system under side-channel attacks,” Entropy, vol. 21, no. 5, pp. 469 (1–33), May 2019.
- S. Watanabe and Y. Oohama, “Privacy amplification theorem for bounded storage eavesdropper,” in Proceedings of 2012 IEEE Information Theory Workshop (ITW), 2012, pp. 177–181.
- Y. Oohama, “Exponential strong converse for one helper source coding problem,” Entropy, vol. 21, no. 6, pp. 567 (1–36), June 2019.
- R. Ahlswede and J. Körner, “Source coding with side information and a converse for the degraded broadcast channel,” IEEE Trans. Inform. Theory, vol. 21, no. 6, pp. 629–637, November 1975.
- A. D. Wyner, “On source coding with side information at the decoder,” IEEE Trans. Inform. Theory, vol. 21, no. 3, pp. 294–300, May 1975.
- M. Hayashi, “Exponential decreasing rate of leaked information in universal random privacy amplification,” IEEE Trans. Inform. Theory, vol. 57, no. 6, pp. 3989–4001, June 2011, arXiv:0904.0308v4.
- M. Hayashi and R. Matsumoto, “Secure multiplex coding with dependent and non-uniform multiple messages,” IEEE Trans. Inform. Theory, vol. 62, no. 5, pp. 2355–2409, May 2016.