Threat on Physical Layer Security: Side Channel vs. Wiretap Channel

The location-specific channel state information can be exploited to generate secret keys for wireless system services, In the multipath wireless environment. Its secrecy capacity was usually studied with the wiretap channel model. This paper proposes a side channel model which is even more threatening to the security of the physical layer randomness based secret keys. We present the information-theoretic analysis of the side channel model, and compare it with the wire-tap model. The analysis indicates that the secret key capacity of the side-channel will be lower than that of the wire-tap channel, especially with a fading scenario. We conduct MATLAB simulation of physical layer randomness based key generation and SPICE simulation of key extraction to observe the side channel leakage of the circuit. The simulation results confirm the consistency of the key bits, thus verifying the feasibility of our proposed side-channel attack scheme against the physical layer security.

[1]  Lin Cai,et al.  Secret Key Generation and Agreement in UWB Communication Channels , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[2]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[3]  R. Gallager Information Theory and Reliable Communication , 1968 .

[4]  Francis Olivier,et al.  Electromagnetic Analysis: Concrete Results , 2001, CHES.

[5]  Jean-Jacques Quisquater,et al.  ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.

[6]  Matthieu Rivain,et al.  On the Exact Success Rate of Side Channel Analysis in the Gaussian Model , 2009, Selected Areas in Cryptography.

[7]  H. Vincent Poor,et al.  Guest Editorial Special Issue on Using the Physical Layer for Securing the Next Generation of Communication Systems , 2011, IEEE Trans. Inf. Forensics Secur..

[8]  Moti Yung,et al.  A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..

[9]  G.S. Smith,et al.  A direct derivation of a single-antenna reciprocity relation for the time domain , 2004, IEEE Transactions on Antennas and Propagation.

[10]  Claude Castelluccia,et al.  An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements , 2009, 2009 3rd International Conference on New Technologies, Mobility and Security.

[11]  David Tse,et al.  Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.

[12]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[13]  Stefan Mangard Exploiting Radiated Emissions - EM Attacks on Cryptographic ICs , 2003 .

[14]  David Tse,et al.  Channel Identification: Secret Sharing using Reciprocity in Ultrawideband Channels , 2007 .

[15]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[16]  Byung-Jae Kwak,et al.  LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.

[17]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[18]  Dakshi Agrawal,et al.  The EM Side-Channel(s) , 2002, CHES.

[19]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[20]  Hisato Iwai,et al.  A secret key agreement scheme with multi-level quantization and parity check using fluctuation of radio channel property , 2008, 2008 IEEE International Symposium on Information Theory.

[21]  Lawrence H. Ozarow,et al.  Wire-tap channel II , 1984, AT&T Bell Laboratories Technical Journal.

[22]  H. Sasaoka,et al.  A Private Key Sharing Scheme Based on Multipath Time Delay in UWB Systems , 2006, 2006 International Conference on Communication Technology.

[23]  Simon W. Moore,et al.  Security evaluation against electromagnetic analysis at design time , 2005, Tenth IEEE International High-Level Design Validation and Test Workshop, 2005..

[24]  T. Ohira,et al.  Wireless secret key generation exploiting the reactance-domain scalar response of multipath fading channels : RSSI interleaving scheme , 2005, The European Conference on Wireless Technology, 2005..

[25]  H. Sasaoka,et al.  A Private Key Agreement Scheme Based on Fluactions of BER in wireless Communications , 2007, The 9th International Conference on Advanced Communication Technology.

[26]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[27]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[28]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[29]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[30]  Rao Yarlagadda,et al.  Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..

[31]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.