GoBack The Thermodynamic of Interference COW19, UCL May 2012 - - PowerPoint PPT Presentation

goback the thermodynamic of interference cow19 ucl may
SMART_READER_LITE
LIVE PREVIEW

GoBack The Thermodynamic of Interference COW19, UCL May 2012 - - PowerPoint PPT Presentation

GoBack The Thermodynamic of Interference COW19, UCL May 2012 Pasquale Malacaria Queen Mary University of London pm@eecs.qmul.ac.uk Pasquale Malacaria Thermodynamic of Interference - slide #1 A surprising connection non-interference =


slide-1
SLIDE 1

GoBack

slide-2
SLIDE 2

Pasquale Malacaria Thermodynamic of Interference - slide #1

The Thermodynamic of Interference COW19, UCL May 2012

Pasquale Malacaria

Queen Mary University of London pm@eecs.qmul.ac.uk

slide-3
SLIDE 3
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #2

A surprising connection

non-interference = perfect confidentiality

■ What has a property (confidentiality) of a human artefact

(software) in common with the fundamental laws of the physical world?

slide-4
SLIDE 4
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #2

A surprising connection

non-interference = perfect confidentiality

■ What has a property (confidentiality) of a human artefact

(software) in common with the fundamental laws of the physical world?

■ Abstract of this talk:

slide-5
SLIDE 5
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #2

A surprising connection

non-interference = perfect confidentiality

■ What has a property (confidentiality) of a human artefact

(software) in common with the fundamental laws of the physical world?

■ Abstract of this talk: ■ thermodynamics foundations of confidentiality

slide-6
SLIDE 6
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #2

A surprising connection

non-interference = perfect confidentiality

■ What has a property (confidentiality) of a human artefact

(software) in common with the fundamental laws of the physical world?

■ Abstract of this talk: ■ thermodynamics foundations of confidentiality ■ Aim of this talk:

slide-7
SLIDE 7
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #2

A surprising connection

non-interference = perfect confidentiality

■ What has a property (confidentiality) of a human artefact

(software) in common with the fundamental laws of the physical world?

■ Abstract of this talk: ■ thermodynamics foundations of confidentiality ■ Aim of this talk: ■ hopefully to be thought provoking (apologies, not an

engineering talk).

slide-8
SLIDE 8
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #3

The problem and security model:

■ An attacker has some a priori knowledge of the secret which

is improved by observing the system

slide-9
SLIDE 9
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #3

The problem and security model:

■ An attacker has some a priori knowledge of the secret which

is improved by observing the system

■ measure this improvement: how much did the attacker gain

from the observations?

slide-10
SLIDE 10
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #3

The problem and security model:

■ An attacker has some a priori knowledge of the secret which

is improved by observing the system

■ measure this improvement: how much did the attacker gain

from the observations?

◆ Example:

■ an attacker steal your cash card; he has no idea about

your pin (apriori probability to guess it 0.0001)

■ to randomly try a pin number at a cash machine will

generate two possible observations:

slide-11
SLIDE 11
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #3

The problem and security model:

■ An attacker has some a priori knowledge of the secret which

is improved by observing the system

■ measure this improvement: how much did the attacker gain

from the observations?

◆ Example:

■ an attacker steal your cash card; he has no idea about

your pin (apriori probability to guess it 0.0001)

■ to randomly try a pin number at a cash machine will

generate two possible observations:

◆ the pin is accepted (with probability 0.0001),

slide-12
SLIDE 12
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #3

The problem and security model:

■ An attacker has some a priori knowledge of the secret which

is improved by observing the system

■ measure this improvement: how much did the attacker gain

from the observations?

◆ Example:

■ an attacker steal your cash card; he has no idea about

your pin (apriori probability to guess it 0.0001)

■ to randomly try a pin number at a cash machine will

generate two possible observations:

◆ the pin is accepted (with probability 0.0001), ◆ the pin is rejected (with probability 0.9999)

slide-13
SLIDE 13
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #3

The problem and security model:

■ An attacker has some a priori knowledge of the secret which

is improved by observing the system

■ measure this improvement: how much did the attacker gain

from the observations?

◆ Example:

■ an attacker steal your cash card; he has no idea about

your pin (apriori probability to guess it 0.0001)

■ to randomly try a pin number at a cash machine will

generate two possible observations:

◆ the pin is accepted (with probability 0.0001), ◆ the pin is rejected (with probability 0.9999) ◆ what has he learned?

slide-14
SLIDE 14
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #4

Quantitative analysis of confidentiality :

Given a function F measuring knowledge compute the difference of the measure F on the secret h before and after

  • bserving the system P

∆F (P, h) = F(h) − F(h|P)

slide-15
SLIDE 15
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #4

Quantitative analysis of confidentiality :

Given a function F measuring knowledge compute the difference of the measure F on the secret h before and after

  • bserving the system P

∆F (P, h) = F(h) − F(h|P)

■ F(h) = measure of the secret h before observations (a priori

knowledge)

slide-16
SLIDE 16
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #4

Quantitative analysis of confidentiality :

Given a function F measuring knowledge compute the difference of the measure F on the secret h before and after

  • bserving the system P

∆F (P, h) = F(h) − F(h|P)

■ F(h) = measure of the secret h before observations (a priori

knowledge)

■ F(h|P) measure of the secret h given observations P (a

posteriori knowledge)

slide-17
SLIDE 17
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #5

Quantitative analysis of confidentiality :

∆F (P, h) = F(h) − F(h|P)

■ What function F measuring knowledge to choose?

slide-18
SLIDE 18
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #5

Quantitative analysis of confidentiality :

∆F (P, h) = F(h) − F(h|P)

■ What function F measuring knowledge to choose? ■ see F(h) − F(h|P) as the Attacker’s reduction in uncertainty

about the secret:

slide-19
SLIDE 19
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #5

Quantitative analysis of confidentiality :

∆F (P, h) = F(h) − F(h|P)

■ What function F measuring knowledge to choose? ■ see F(h) − F(h|P) as the Attacker’s reduction in uncertainty

about the secret:

■ F(h) = initial Attacker’s uncertainty about the secret h

slide-20
SLIDE 20
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #5

Quantitative analysis of confidentiality :

∆F (P, h) = F(h) − F(h|P)

■ What function F measuring knowledge to choose? ■ see F(h) − F(h|P) as the Attacker’s reduction in uncertainty

about the secret:

■ F(h) = initial Attacker’s uncertainty about the secret h ■ F(h|P) = Attacker’s remaining uncertainty about h given the

  • bservations
slide-21
SLIDE 21
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #6

Quantitative analysis of confidentiality

difference of the measure F on the secret h before and after

  • bserving the system P

∆F (P, h) = F(h) − F(h|P)

slide-22
SLIDE 22
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #6

Quantitative analysis of confidentiality

difference of the measure F on the secret h before and after

  • bserving the system P

∆F (P, h) = F(h) − F(h|P)

■ possible choices for F, F(−|−) given by Shannon’s

information theory:

slide-23
SLIDE 23
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #6

Quantitative analysis of confidentiality

difference of the measure F on the secret h before and after

  • bserving the system P

∆F (P, h) = F(h) − F(h|P)

■ possible choices for F, F(−|−) given by Shannon’s

information theory:

■ F(h) = H(h)=initial uncertainty=entropy of secret h before

  • bservations= a priory information about h
slide-24
SLIDE 24
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #6

Quantitative analysis of confidentiality

difference of the measure F on the secret h before and after

  • bserving the system P

∆F (P, h) = F(h) − F(h|P)

■ possible choices for F, F(−|−) given by Shannon’s

information theory:

■ F(h) = H(h)=initial uncertainty=entropy of secret h before

  • bservations= a priory information about h

■ F(h|P) = H(h|P)=remaining uncertainty=entropy of secret h

given observations= information about h given observations

slide-25
SLIDE 25
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #6

Quantitative analysis of confidentiality

difference of the measure F on the secret h before and after

  • bserving the system P

∆F (P, h) = F(h) − F(h|P)

■ possible choices for F, F(−|−) given by Shannon’s

information theory:

■ F(h) = H(h)=initial uncertainty=entropy of secret h before

  • bservations= a priory information about h

■ F(h|P) = H(h|P)=remaining uncertainty=entropy of secret h

given observations= information about h given observations

■ ∆H (Cash machine,h)=0.00147

slide-26
SLIDE 26
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #6

Quantitative analysis of confidentiality

difference of the measure F on the secret h before and after

  • bserving the system P

∆F (P, h) = F(h) − F(h|P)

■ possible choices for F, F(−|−) given by Shannon’s

information theory:

■ F(h) = H(h)=initial uncertainty=entropy of secret h before

  • bservations= a priory information about h

■ F(h|P) = H(h|P)=remaining uncertainty=entropy of secret h

given observations= information about h given observations

■ ∆H (Cash machine,h)=0.00147 ■ Clark-Hunt-Malacaria 2002, inspired by Dennings, McLean,

Gray

slide-27
SLIDE 27
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #7

Quantitative analysis of confidentiality

difference of the measure F on the secret h before and after

  • bserving the system P

∆H(P, h) = H(h) − H(h|P) (Notice ∆H(P, h) ≥ 0)

slide-28
SLIDE 28
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #7

Quantitative analysis of confidentiality

difference of the measure F on the secret h before and after

  • bserving the system P

∆H(P, h) = H(h) − H(h|P) (Notice ∆H(P, h) ≥ 0)

■ Easy to show that ∆H(P, h) = 0 iff the system leaks no

information.

slide-29
SLIDE 29
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #7

Quantitative analysis of confidentiality

difference of the measure F on the secret h before and after

  • bserving the system P

∆H(P, h) = H(h) − H(h|P) (Notice ∆H(P, h) ≥ 0)

■ Easy to show that ∆H(P, h) = 0 iff the system leaks no

information.

■ hence ∆H(P, h) = 0 iff noninterference.

slide-30
SLIDE 30
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #7

Quantitative analysis of confidentiality

difference of the measure F on the secret h before and after

  • bserving the system P

∆H(P, h) = H(h) − H(h|P) (Notice ∆H(P, h) ≥ 0)

■ Easy to show that ∆H(P, h) = 0 iff the system leaks no

information.

■ hence ∆H(P, h) = 0 iff noninterference. ■ But what does it mean when interference is positive?

slide-31
SLIDE 31
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #7

Quantitative analysis of confidentiality

difference of the measure F on the secret h before and after

  • bserving the system P

∆H(P, h) = H(h) − H(h|P) (Notice ∆H(P, h) ≥ 0)

■ Easy to show that ∆H(P, h) = 0 iff the system leaks no

information.

■ hence ∆H(P, h) = 0 iff noninterference. ■ But what does it mean when interference is positive? ■ what does it mean ∆H(P, h) = C > 0

slide-32
SLIDE 32
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #7

Quantitative analysis of confidentiality

difference of the measure F on the secret h before and after

  • bserving the system P

∆H(P, h) = H(h) − H(h|P) (Notice ∆H(P, h) ≥ 0)

■ Easy to show that ∆H(P, h) = 0 iff the system leaks no

information.

■ hence ∆H(P, h) = 0 iff noninterference. ■ But what does it mean when interference is positive? ■ what does it mean ∆H(P, h) = C > 0 ■ what ∆H (Cash machine,h)=0.00147 means?

slide-33
SLIDE 33
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #7

Quantitative analysis of confidentiality

difference of the measure F on the secret h before and after

  • bserving the system P

∆H(P, h) = H(h) − H(h|P) (Notice ∆H(P, h) ≥ 0)

■ Easy to show that ∆H(P, h) = 0 iff the system leaks no

information.

■ hence ∆H(P, h) = 0 iff noninterference. ■ But what does it mean when interference is positive? ■ what does it mean ∆H(P, h) = C > 0 ■ what ∆H (Cash machine,h)=0.00147 means? ■ for example why not 0.005?

slide-34
SLIDE 34
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #8

The Thermodynamics of Confidentiality

Consider again the leakage formula ∆H(P, h) = H(h) − H(h|P)

■ Define W = H(h) − H(P), i.e. the difference between the

initial and observations’ uncertainty.

slide-35
SLIDE 35
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #8

The Thermodynamics of Confidentiality

Consider again the leakage formula ∆H(P, h) = H(h) − H(h|P)

■ Define W = H(h) − H(P), i.e. the difference between the

initial and observations’ uncertainty.

■ Notice that (for deterministic systems) the following are

equivalent to the above W

slide-36
SLIDE 36
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #8

The Thermodynamics of Confidentiality

Consider again the leakage formula ∆H(P, h) = H(h) − H(h|P)

■ Define W = H(h) − H(P), i.e. the difference between the

initial and observations’ uncertainty.

■ Notice that (for deterministic systems) the following are

equivalent to the above W

■ W = H(h|P) (=the remaining uncertainty)

slide-37
SLIDE 37
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #8

The Thermodynamics of Confidentiality

Consider again the leakage formula ∆H(P, h) = H(h) − H(h|P)

■ Define W = H(h) − H(P), i.e. the difference between the

initial and observations’ uncertainty.

■ Notice that (for deterministic systems) the following are

equivalent to the above W

■ W = H(h|P) (=the remaining uncertainty) ■ W = H(h) − ∆H(P, h) (=what has not been leaked)

slide-38
SLIDE 38
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #8

The Thermodynamics of Confidentiality

Consider again the leakage formula ∆H(P, h) = H(h) − H(h|P)

■ Define W = H(h) − H(P), i.e. the difference between the

initial and observations’ uncertainty.

■ Notice that (for deterministic systems) the following are

equivalent to the above W

■ W = H(h|P) (=the remaining uncertainty) ■ W = H(h) − ∆H(P, h) (=what has not been leaked) ■ we can see W as the cost to protect the secret...

slide-39
SLIDE 39
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #9

The Thermodynamics of Confidentiality

W = H(h) − H(P) is the cost... cost of what?

■ think of a computer in a room at temperature T.

slide-40
SLIDE 40
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #9

The Thermodynamics of Confidentiality

W = H(h) − H(P) is the cost... cost of what?

■ think of a computer in a room at temperature T. ■ the computer has some energy cost to run

slide-41
SLIDE 41
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #9

The Thermodynamics of Confidentiality

W = H(h) − H(P) is the cost... cost of what?

■ think of a computer in a room at temperature T. ■ the computer has some energy cost to run ■ this energy will be almost entirely transformed into heat

slide-42
SLIDE 42
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #9

The Thermodynamics of Confidentiality

W = H(h) − H(P) is the cost... cost of what?

■ think of a computer in a room at temperature T. ■ the computer has some energy cost to run ■ this energy will be almost entirely transformed into heat ■ W is the energy to be converted in heat to guarantee

confidentiality.

slide-43
SLIDE 43
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #9

The Thermodynamics of Confidentiality

W = H(h) − H(P) is the cost... cost of what?

■ think of a computer in a room at temperature T. ■ the computer has some energy cost to run ■ this energy will be almost entirely transformed into heat ■ W is the energy to be converted in heat to guarantee

confidentiality.

slide-44
SLIDE 44
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #10

The Thermodynamics of Confidentiality

Given computation with leakage ∆H(P, h) = H(h) − H(h|P)

■ and P =final state of the system

slide-45
SLIDE 45
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #10

The Thermodynamics of Confidentiality

Given computation with leakage ∆H(P, h) = H(h) − H(h|P)

■ and P =final state of the system ■ W ln(2)KBT = minimum dissipation of any system

implementing that computation (KB = Boltzmann constant, T =system temperature).

slide-46
SLIDE 46
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #10

The Thermodynamics of Confidentiality

Given computation with leakage ∆H(P, h) = H(h) − H(h|P)

■ and P =final state of the system ■ W ln(2)KBT = minimum dissipation of any system

implementing that computation (KB = Boltzmann constant, T =system temperature).

■ ("The Thermodynamics of Confidentiality":

Malacaria-Smeraldi CSF2012)

slide-47
SLIDE 47
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #10

The Thermodynamics of Confidentiality

Given computation with leakage ∆H(P, h) = H(h) − H(h|P)

■ and P =final state of the system ■ W ln(2)KBT = minimum dissipation of any system

implementing that computation (KB = Boltzmann constant, T =system temperature).

■ ("The Thermodynamics of Confidentiality":

Malacaria-Smeraldi CSF2012)

■ e.g. security dissipation of a cash machine

(13.2877124 − 0.00147) ln(2)KBT

slide-48
SLIDE 48
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #11

The Thermodynamics of Confidentiality

13.28 ln(2)KBT

■ very small... 8 orders of magnitude below current

electronics, but...

slide-49
SLIDE 49
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #11

The Thermodynamics of Confidentiality

13.28 ln(2)KBT

■ very small... 8 orders of magnitude below current

electronics, but...

■ "Silicon-based technology is predicted to attain the Landauer

limit (ln(2)KBT) in 20 to 30 years," (Nature (March 2012))

slide-50
SLIDE 50
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #11

The Thermodynamics of Confidentiality

13.28 ln(2)KBT

■ very small... 8 orders of magnitude below current

electronics, but...

■ "Silicon-based technology is predicted to attain the Landauer

limit (ln(2)KBT) in 20 to 30 years," (Nature (March 2012))

■ there is a very active research in Physics on computing

devices with“close to 0” dissipation :

slide-51
SLIDE 51
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #11

The Thermodynamics of Confidentiality

13.28 ln(2)KBT

■ very small... 8 orders of magnitude below current

electronics, but...

■ "Silicon-based technology is predicted to attain the Landauer

limit (ln(2)KBT) in 20 to 30 years," (Nature (March 2012))

■ there is a very active research in Physics on computing

devices with“close to 0” dissipation :

■ Nature (2011): implementation of Szilard engine, i.e.

computation at near 0 dissipation.

slide-52
SLIDE 52
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #11

The Thermodynamics of Confidentiality

13.28 ln(2)KBT

■ very small... 8 orders of magnitude below current

electronics, but...

■ "Silicon-based technology is predicted to attain the Landauer

limit (ln(2)KBT) in 20 to 30 years," (Nature (March 2012))

■ there is a very active research in Physics on computing

devices with“close to 0” dissipation :

■ Nature (2011): implementation of Szilard engine, i.e.

computation at near 0 dissipation.

■ Nature (March 2012): “1 bit reset” cost at least ln(2)KBT.

slide-53
SLIDE 53
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #11

The Thermodynamics of Confidentiality

13.28 ln(2)KBT

■ very small... 8 orders of magnitude below current

electronics, but...

■ "Silicon-based technology is predicted to attain the Landauer

limit (ln(2)KBT) in 20 to 30 years," (Nature (March 2012))

■ there is a very active research in Physics on computing

devices with“close to 0” dissipation :

■ Nature (2011): implementation of Szilard engine, i.e.

computation at near 0 dissipation.

■ Nature (March 2012): “1 bit reset” cost at least ln(2)KBT. ■ Confidentiality (W) is a lower bound on dissipation of

computing devices

slide-54
SLIDE 54
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #12

The Thermodynamics of Confidentiality

Confidentiality (W) is a lower bound on dissipation of computing devices

■ a surprising consequence:

slide-55
SLIDE 55
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #12

The Thermodynamics of Confidentiality

Confidentiality (W) is a lower bound on dissipation of computing devices

■ a surprising consequence: ■ a constant function “ do nothing”

slide-56
SLIDE 56
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #12

The Thermodynamics of Confidentiality

Confidentiality (W) is a lower bound on dissipation of computing devices

■ a surprising consequence: ■ a constant function “ do nothing” ■ yet the computation of a constant function may heat more

than any “difficult function”...

slide-57
SLIDE 57
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #12

The Thermodynamics of Confidentiality

Confidentiality (W) is a lower bound on dissipation of computing devices

■ a surprising consequence: ■ a constant function “ do nothing” ■ yet the computation of a constant function may heat more

than any “difficult function”...

■ (also calorimeters may detect leaks: if it should heat X and

heats Y << X instead then chances are there is an unwanted leak)

slide-58
SLIDE 58
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #13

The Thermodynamics of Computation

Where is W coming from? It starts with Maxwell, and his demon...

■ Von Neumann: elementary (1 bit) computation dissipate

ln(2)KBT

slide-59
SLIDE 59
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #13

The Thermodynamics of Computation

Where is W coming from? It starts with Maxwell, and his demon...

■ Von Neumann: elementary (1 bit) computation dissipate

ln(2)KBT

■ Landauer: only elementary (1bit) irreversible computation

dissipate ln(2)KBT

slide-60
SLIDE 60
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #13

The Thermodynamics of Computation

Where is W coming from? It starts with Maxwell, and his demon...

■ Von Neumann: elementary (1 bit) computation dissipate

ln(2)KBT

■ Landauer: only elementary (1bit) irreversible computation

dissipate ln(2)KBT

■ Bennet: all computations can be made reversible, so no

dissipation needed

slide-61
SLIDE 61
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #13

The Thermodynamics of Computation

Where is W coming from? It starts with Maxwell, and his demon...

■ Von Neumann: elementary (1 bit) computation dissipate

ln(2)KBT

■ Landauer: only elementary (1bit) irreversible computation

dissipate ln(2)KBT

■ Bennet: all computations can be made reversible, so no

dissipation needed

■ (good reference: Feynman Lectures in Computation)

slide-62
SLIDE 62
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #13

The Thermodynamics of Computation

Where is W coming from? It starts with Maxwell, and his demon...

■ Von Neumann: elementary (1 bit) computation dissipate

ln(2)KBT

■ Landauer: only elementary (1bit) irreversible computation

dissipate ln(2)KBT

■ Bennet: all computations can be made reversible, so no

dissipation needed

■ (good reference: Feynman Lectures in Computation) ■ confidentiality needs irreversibility

slide-63
SLIDE 63
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #13

The Thermodynamics of Computation

Where is W coming from? It starts with Maxwell, and his demon...

■ Von Neumann: elementary (1 bit) computation dissipate

ln(2)KBT

■ Landauer: only elementary (1bit) irreversible computation

dissipate ln(2)KBT

■ Bennet: all computations can be made reversible, so no

dissipation needed

■ (good reference: Feynman Lectures in Computation) ■ confidentiality needs irreversibility ■ how much irreversibility?

slide-64
SLIDE 64
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #13

The Thermodynamics of Computation

Where is W coming from? It starts with Maxwell, and his demon...

■ Von Neumann: elementary (1 bit) computation dissipate

ln(2)KBT

■ Landauer: only elementary (1bit) irreversible computation

dissipate ln(2)KBT

■ Bennet: all computations can be made reversible, so no

dissipation needed

■ (good reference: Feynman Lectures in Computation) ■ confidentiality needs irreversibility ■ how much irreversibility? ■ exactly W

slide-65
SLIDE 65
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #13

The Thermodynamics of Computation

Where is W coming from? It starts with Maxwell, and his demon...

■ Von Neumann: elementary (1 bit) computation dissipate

ln(2)KBT

■ Landauer: only elementary (1bit) irreversible computation

dissipate ln(2)KBT

■ Bennet: all computations can be made reversible, so no

dissipation needed

■ (good reference: Feynman Lectures in Computation) ■ confidentiality needs irreversibility ■ how much irreversibility? ■ exactly W ■ This is what 0.00147 mean...

slide-66
SLIDE 66
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #14

The Thermodynamics of Confidentiality

Notice we assumed the system to be deterministic... What if the system is probabilistic?

■ a register containing a secret may be randomised instead of

being reset

slide-67
SLIDE 67
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #14

The Thermodynamics of Confidentiality

Notice we assumed the system to be deterministic... What if the system is probabilistic?

■ a register containing a secret may be randomised instead of

being reset

■ (here we are thinking of truly random processes, not

Math.random()...)

slide-68
SLIDE 68
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #14

The Thermodynamics of Confidentiality

Notice we assumed the system to be deterministic... What if the system is probabilistic?

■ a register containing a secret may be randomised instead of

being reset

■ (here we are thinking of truly random processes, not

Math.random()...)

■ what happen then?

slide-69
SLIDE 69
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #15

The Thermodynamics of Confidentiality

Notice we assumed the system to be deterministic... What if the system is probabilistic?

■ That’s why we defined W = H(h) − H(P) and not

W = H(h|P)

slide-70
SLIDE 70
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #15

The Thermodynamics of Confidentiality

Notice we assumed the system to be deterministic... What if the system is probabilistic?

■ That’s why we defined W = H(h) − H(P) and not

W = H(h|P)

■ for probabilistic systems W can be negative:

slide-71
SLIDE 71
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #15

The Thermodynamics of Confidentiality

Notice we assumed the system to be deterministic... What if the system is probabilistic?

■ That’s why we defined W = H(h) − H(P) and not

W = H(h|P)

■ for probabilistic systems W can be negative: ■ the randomization process inject entropy in the system,

slide-72
SLIDE 72
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #15

The Thermodynamics of Confidentiality

Notice we assumed the system to be deterministic... What if the system is probabilistic?

■ That’s why we defined W = H(h) − H(P) and not

W = H(h|P)

■ for probabilistic systems W can be negative: ■ the randomization process inject entropy in the system, ■ that means that “work” can be extracted by the system...

slide-73
SLIDE 73
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #15

The Thermodynamics of Confidentiality

Notice we assumed the system to be deterministic... What if the system is probabilistic?

■ That’s why we defined W = H(h) − H(P) and not

W = H(h|P)

■ for probabilistic systems W can be negative: ■ the randomization process inject entropy in the system, ■ that means that “work” can be extracted by the system... ■ when W is negative W ln(2)KBT is the work that can be

extracted by the system.

slide-74
SLIDE 74
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #15

The Thermodynamics of Confidentiality

Notice we assumed the system to be deterministic... What if the system is probabilistic?

■ That’s why we defined W = H(h) − H(P) and not

W = H(h|P)

■ for probabilistic systems W can be negative: ■ the randomization process inject entropy in the system, ■ that means that “work” can be extracted by the system... ■ when W is negative W ln(2)KBT is the work that can be

extracted by the system.

■ It is not a free lunch: it needs to be paid back to return the

system to its initial state...

slide-75
SLIDE 75
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #16

A clarification about power analysis:

Very successful crypto attacks are based on heat dissipation (power analysis attacks on smart cards): deduce what path in the circuit was taken by a computation by measuring power consumption.

■ From that path infer (part of) the secret.

slide-76
SLIDE 76
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #16

A clarification about power analysis:

Very successful crypto attacks are based on heat dissipation (power analysis attacks on smart cards): deduce what path in the circuit was taken by a computation by measuring power consumption.

■ From that path infer (part of) the secret. ■ These attacks are due to technology inefficiencies, not to

fundamental physical laws.

slide-77
SLIDE 77
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #16

A clarification about power analysis:

Very successful crypto attacks are based on heat dissipation (power analysis attacks on smart cards): deduce what path in the circuit was taken by a computation by measuring power consumption.

■ From that path infer (part of) the secret. ■ These attacks are due to technology inefficiencies, not to

fundamental physical laws.

■ Cryptography is (mathematically trivially) reversible so

efficient technology will moderated these attacks.

slide-78
SLIDE 78
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #16

A clarification about power analysis:

Very successful crypto attacks are based on heat dissipation (power analysis attacks on smart cards): deduce what path in the circuit was taken by a computation by measuring power consumption.

■ From that path infer (part of) the secret. ■ These attacks are due to technology inefficiencies, not to

fundamental physical laws.

■ Cryptography is (mathematically trivially) reversible so

efficient technology will moderated these attacks.

■ But W cannot be moderated...

slide-79
SLIDE 79
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #17

Alternative measures of knowledge:

∆F (P, h) = F(h) − F(h|P)

■ What about choosing a different F? is there still a physical

meaning?

slide-80
SLIDE 80
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #17

Alternative measures of knowledge:

∆F (P, h) = F(h) − F(h|P)

■ What about choosing a different F? is there still a physical

meaning?

■ Probability of guessing in one try: (introduced by Smith and

noted ME)

slide-81
SLIDE 81
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #17

Alternative measures of knowledge:

∆F (P, h) = F(h) − F(h|P)

■ What about choosing a different F? is there still a physical

meaning?

■ Probability of guessing in one try: (introduced by Smith and

noted ME)

■ F(h) = G(h) = − log(maxx∈h µ(h = x)) = a priory probability

  • f guessing h
slide-82
SLIDE 82
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #17

Alternative measures of knowledge:

∆F (P, h) = F(h) − F(h|P)

■ What about choosing a different F? is there still a physical

meaning?

■ Probability of guessing in one try: (introduced by Smith and

noted ME)

■ F(h) = G(h) = − log(maxx∈h µ(h = x)) = a priory probability

  • f guessing h

■ F(h|P) = G(h|P) = − log( y∈P µ(y)(maxx∈h µ(h = x|P =

y))) = probability of guessing h given observations

slide-83
SLIDE 83
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #17

Alternative measures of knowledge:

∆F (P, h) = F(h) − F(h|P)

■ What about choosing a different F? is there still a physical

meaning?

■ Probability of guessing in one try: (introduced by Smith and

noted ME)

■ F(h) = G(h) = − log(maxx∈h µ(h = x)) = a priory probability

  • f guessing h

■ F(h|P) = G(h|P) = − log( y∈P µ(y)(maxx∈h µ(h = x|P =

y))) = probability of guessing h given observations

■ ∆ME (Cash machine,h)=1 (= log(2)): chances have

doubled)

slide-84
SLIDE 84
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #18

The Thermodynamics of guessability

∆ME(P, h) = G(h) − G(h|P)

■ G(h|P) ≤ W

slide-85
SLIDE 85
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #18

The Thermodynamics of guessability

∆ME(P, h) = G(h) − G(h|P)

■ G(h|P) ≤ W ■ G(h|P) = W iff the system initial and final states are

maximally disordered ( e.g. a program computing h%m)

slide-86
SLIDE 86
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #18

The Thermodynamics of guessability

∆ME(P, h) = G(h) − G(h|P)

■ G(h|P) ≤ W ■ G(h|P) = W iff the system initial and final states are

maximally disordered ( e.g. a program computing h%m)

■ Intruiging: first “connection” between guessabiity and

thermodynamics...

slide-87
SLIDE 87
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #19

Conclusions

Measures of interference have a profound physical meaning.

■ They relate to fundamental limits of computing devices

slide-88
SLIDE 88
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #19

Conclusions

Measures of interference have a profound physical meaning.

■ They relate to fundamental limits of computing devices ■ and to cutting edge research in Physics;

slide-89
SLIDE 89
  • title1
  • A surprising connection
  • The problem and security

model:

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality :

  • Quantitative analysis of

confidentiality

  • Quantitative analysis of

confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Computation

  • The Thermodynamics of

Confidentiality

  • The Thermodynamics of

Confidentiality

  • A clarification about power

analysis:

  • Alternative measures of

knowledge:

  • The Thermodynamics of

guessability

  • Conclusions

Pasquale Malacaria Thermodynamic of Interference - slide #19

Conclusions

Measures of interference have a profound physical meaning.

■ They relate to fundamental limits of computing devices ■ and to cutting edge research in Physics; ■ they give a fresh angle on the thermodynamics of

computation.