Hostname: page-component-6766d58669-kl59c Total loading time: 0 Render date: 2026-05-24T07:26:57.574Z Has data issue: false hasContentIssue false

Asymptotic information leakage under one-try attacks

Published online by Cambridge University Press:  10 November 2014

MICHELE BOREALE*
Affiliation:
Università di Firenze – Dipartimento di Statistica, Informatica, Applicazioni, Viale Morgagni 65, 50134 Firenze, Italy Email: michele.boreale@unifi.it
FRANCESCA PAMPALONI
Affiliation:
IMT Lucca Institute for Advanced Studies - Piazza S. Ponziano 6, 55100 Lucca, Italy Email: francesca.pampaloni@imtlucca.it, michela.paolini@imtlucca.it
MICHELA PAOLINI
Affiliation:
IMT Lucca Institute for Advanced Studies - Piazza S. Ponziano 6, 55100 Lucca, Italy Email: francesca.pampaloni@imtlucca.it, michela.paolini@imtlucca.it
*
Corresponding author: Michele Boreale, Università di Firenze, Dipartimento di Sistemi e Informatica, Viale Morgagni 65, I-50134 Firenze, Italy. E-mail: michele.boreale@unifi.it.
Rights & Permissions [Opens in a new window]

Abstract

Core share and HTML view are not available for this content. However, as you have access to this content, a full PDF is available via the 'Save PDF' action button.

We study the asymptotic behaviour of (a) information leakage and (b) adversary's error probability in information hiding systems modelled as noisy channels. Specifically, we assume the attacker can make a single guess after observing n independent executions of the system, throughout which the secret information is kept fixed. We show that the asymptotic behaviour of quantities (a) and (b) can be determined in a simple way from the channel matrix. Moreover, simple and tight bounds on them as functions of n show that the convergence is exponential. We also discuss feasible methods to evaluate the rate of convergence. Our results cover both the Bayesian case, where an a priori probability distribution on the secrets is assumed known to the attacker, and the maximum-likelihood case, where the attacker does not know such distribution. In the Bayesian case, we identify the distributions that maximize leakage. We consider both the min-entropy setting studied by Smith and the additive form recently proposed by Braun et al. and show the two forms do agree asymptotically. Next, we extend these results to a more sophisticated eavesdropping scenario, where the attacker can perform a (noisy) observation at each state of the computation and the systems are modelled as hidden Markov models.

Information

Type
Special Issue: Quantitative Information Flow
Copyright
Copyright © Cambridge University Press 2014