Back to Search Start Over

How (Not) to Use Welch’s T-Test in Side-Channel Security Evaluations

Authors :
Standaert, François-Xavier
17th International Conference on Smart Card Research and Advanced Applications (CARDIS 2018)
UCL - SST/ICTM/ELEN - Pôle en ingénierie électrique
Source :
Smart Card Research and Advanced Applications-17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected Papers, Lecture Notes in Computational Science and Engineering, Vol. 11389, p. 65-79 (2019), Smart Card Research and Advanced Applications ISBN: 9783030154615, CARDIS, Lecture Notes in Computer Science, Lecture Notes in Computer Science-Smart Card Research and Advanced Applications
Publication Year :
2019

Abstract

The Test Vector Leakage Assessment (TVLA) methodology is a qualitative tool relying on Welch’s T-test to assess the security of cryptographic implementations against side-channel attacks. Despite known limitations (e.g., risks of false negatives and positives), it is sometimes considered as a pass-fail test to determine whether such implementations are “safe” or not (without clear definition of what is “safe”). In this note, we clarify the limited quantitative meaning of this test when used as a standalone tool. For this purpose, we first show that the straightforward application of this approach to assess the security of a masked implementation is not sufficient. More precisely, we show that even in a simple (more precisely, univariate) case study that seems best suited for the TVLA methodology, detection (or lack thereof) with Welch’s T-test can be totally disconnected from the actual security level of an implementation. For this purpose, we put forward the case of a realistic masking scheme that looks very safe from the TVLA point-of-view and is nevertheless easy to break. We then discuss this result in more general terms and argue that this limitation is shared by all “moment-based” security evaluations. We conclude the note positively, by describing how to use moment-based analyses as a useful ingredient of side-channel security evaluations, to determine a “security order”.

Details

ISBN :
978-3-030-15461-5
978-3-030-15462-2
ISSN :
03029743 and 16113349
ISBNs :
9783030154615 and 9783030154622
Database :
OpenAIRE
Journal :
Smart Card Research and Advanced Applications - 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected Papers
Accession number :
edsair.doi.dedup.....8f3755324d45bfb1aa2e8e8e98c413de
Full Text :
https://doi.org/10.1007/978-3-030-15462-2_5