Security

Defensive Leakage Camouflage

Free registration required

Executive Summary

This paper considers the transfer of digital data over leaky and noisy communication channels. The authors develop defensive strategies exploiting the fact that noise prevents the attacker from accurately measuring leakage. The defense strategy described in this paper pairs each useful data element k with a camouflage value v and simultaneously transmits both k and v over the channel. This releases an emission e (k, v). They wish to select the camouflage values v (k) as a function of k in a way that makes the quantities e (k, v(k)) as indistinguishable as possible from each other. They model the problem and show that optimal camouflage values can be computed from side-channels under very weak physical assumptions. The proposed technique is hence applicable to a wide range of readily available technologies.

  • Format: PDF
  • Size: 529.6 KB