The bias–variance decomposition in profiled attacks

Liran Lerman, Gianluca Bontempi, Olivier Markowitch
2015 Journal of Cryptographic Engineering  
The profiled attacks challenge the security of cryptographic devices in the worst case scenario. We elucidate the reasons underlying the success of different profiled attacks (that depend essentially on the context) based on the well-known bias-variance tradeoff developed in the machine learning field. Note that our approach can easily be extended to non-profiled attacks. We show (1) how to decompose (in three additive components) the error rate of an attack based on the bias-variance
more » ... ion, and (2) how to reduce the error rate of a model based on the bias-variance diagnostic. Intuitively, we show that different models having the same error rate require different strategies (according to the bias-variance decomposition) to reduce their errors. More precisely, the success rate of a strategy depends on several criteria such as its complexity, the leakage information and the number of points per trace. As a result, a suboptimal strategy in a specific context can lead the adversary to overestimate the security level of the cryptographic device. Our results also bring warnings related to the estimation of the success rate of a profiled attack that can lead the evaluator to underestimate the security level. In brief, certify that a chip leaks (or not) sensitive information represents a hard if not impossible task.
doi:10.1007/s13389-015-0106-1 fatcat:yptqybkvrzhtdov5bq32354ehe