Skip to main content
Erschienen in: Cryptography and Communications 1/2021

08.09.2020 | Review Article

Design of fault-resilient S-boxes for AES-like block ciphers

verfasst von: Swapan Maiti, Dipanwita Roy Chowdhury

Erschienen in: Cryptography and Communications | Ausgabe 1/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Substitution functions (S-boxes) play an important role in the security of AES-like cryptosystems, but the cryptosystems are highly vulnerable against fault injection attacks. Some research has been carried out previously to prevent fault injection attacks on AES, but most of the countermeasures are restricted to the detection of faults only, and they only work at the cost of large hardware needed for duplicating the S-boxes. In this paper, we present a design construction of fault-resilient S-boxes for AES-like block ciphers by fault detection and correction. The random evolution of cellular automata with linear and nonlinear neighborhood functions is exploited to design these S-boxes. The proposed design guarantees 100% coverage of single-byte fault correction and double-byte fault detection in the S-boxes. The FPGA implementation shows that our design makes the substitution boxes fault-resilient with 21.34% extra hardware compared to the AES substitution layer.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Advances in Cryptology - CRYPTO ’97, 17Th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings. pp. 513–525. https://doi.org/10.1007/BFb0052259 (1997) Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Advances in Cryptology - CRYPTO ’97, 17Th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings. pp. 513–525. https://​doi.​org/​10.​1007/​BFb0052259 (1997)
4.
Zurück zum Zitat Boneh, D., DeMillo, R. A., Lipton, R. J.: On the importance of checking cryptographic protocols for faults (Extended Abstract). In: Advances in Cryptology - EUROCRYPT ’97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding. pp. 37–51 (1997) Boneh, D., DeMillo, R. A., Lipton, R. J.: On the importance of checking cryptographic protocols for faults (Extended Abstract). In: Advances in Cryptology - EUROCRYPT ’97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding. pp. 37–51 (1997)
6.
Zurück zum Zitat Carlet, C.: S-boxes, boolean functions and codes for the resistance of block ciphers to cryptographic attacks, with or without side channels. In: Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings. pp. 151–171 (2015), . https://doi.org/10.1007/978-3-319-24126-5_10 Carlet, C.: S-boxes, boolean functions and codes for the resistance of block ciphers to cryptographic attacks, with or without side channels. In: Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings. pp. 151–171 (2015), . https://​doi.​org/​10.​1007/​978-3-319-24126-5_​10
7.
Zurück zum Zitat Cattell, K., Muzio, J.C.: Synthesis of one-dimensional linear hybrid cellular automata. IEEE Trans. on CAD of Integrated Circuits and Systems 15 (3), 325–335 (1996)CrossRef Cattell, K., Muzio, J.C.: Synthesis of one-dimensional linear hybrid cellular automata. IEEE Trans. on CAD of Integrated Circuits and Systems 15 (3), 325–335 (1996)CrossRef
8.
Zurück zum Zitat Chaudhuri, P.P., Roy Chowdhury, D., Nandi, S., Chattopadhyay, S.: Additive Cellular automata: Theory and Applications. IEEE Computer Socity press (1997) Chaudhuri, P.P., Roy Chowdhury, D., Nandi, S., Chattopadhyay, S.: Additive Cellular automata: Theory and Applications. IEEE Computer Socity press (1997)
9.
Zurück zum Zitat Cusick, T.W., Stanica, P.: Cryptographic boolean functions and applications. Academic Press (2009) Cusick, T.W., Stanica, P.: Cryptographic boolean functions and applications. Academic Press (2009)
11.
Zurück zum Zitat Ghosh, S., Saha, D., Sengupta, A., Roy Chowdhury, D.: Preventing fault attacks using fault randomization with a case study on AES. In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings. pp. 343–355. https://doi.org/10.1007/978-3-319-19962-7_20(2015) Ghosh, S., Saha, D., Sengupta, A., Roy Chowdhury, D.: Preventing fault attacks using fault randomization with a case study on AES. In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings. pp. 343–355. https://​doi.​org/​10.​1007/​978-3-319-19962-7_​20(2015)
14.
Zurück zum Zitat Lomné, V., Roche, T., Thillard, A.: On the need of randomness in fault attack countermeasures - application to AES. In: 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven, Belgium, September 9, 2012. Pp. 85–94. https://doi.org/10.1109/FDTC.2012.19 (2012) Lomné, V., Roche, T., Thillard, A.: On the need of randomness in fault attack countermeasures - application to AES. In: 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven, Belgium, September 9, 2012. Pp. 85–94. https://​doi.​org/​10.​1109/​FDTC.​2012.​19 (2012)
16.
Zurück zum Zitat Mui, E.N.: Practical implementation of Rijndael S-box using combinational logic. Custom R & D Engineer Texco Enterprise Pvt Ltd (2007) Mui, E.N.: Practical implementation of Rijndael S-box using combinational logic. Custom R & D Engineer Texco Enterprise Pvt Ltd (2007)
17.
Zurück zum Zitat Mukhopadhyay, D.: An improved fault based attack of the advanced encryption standard. In: Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings. pp. 421–434. https://doi.org/10.1007/978-3-642-02384-2_26 (2009) Mukhopadhyay, D.: An improved fault based attack of the advanced encryption standard. In: Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings. pp. 421–434. https://​doi.​org/​10.​1007/​978-3-642-02384-2_​26 (2009)
18.
Zurück zum Zitat Natale, G. D., Flottes, M., Rouzeyre, B.: An on-line fault detection scheme for Sboxes in secure circuits. In: 13Th IEEE international on-line testing symposium (IOLTS 2007), 8-11 July 2007, Heraklion, Crete, Greece. pp. 57–62. https://doi.org/10.1109/IOLTS.2007.16 (2007) Natale, G. D., Flottes, M., Rouzeyre, B.: An on-line fault detection scheme for Sboxes in secure circuits. In: 13Th IEEE international on-line testing symposium (IOLTS 2007), 8-11 July 2007, Heraklion, Crete, Greece. pp. 57–62. https://​doi.​org/​10.​1109/​IOLTS.​2007.​16 (2007)
19.
Zurück zum Zitat Neumann, J.V.: The theory of self- reproducing automata. (edited by A.W. Burks) univ of illinois press urbana (1966) Neumann, J.V.: The theory of self- reproducing automata. (edited by A.W. Burks) univ of illinois press urbana (1966)
20.
Zurück zum Zitat Picek, S., Mariot, L., Yang, B., Jakobovic, D., Mentens, N.: Design of S-boxes defined with cellular automata rules. In: Proceedings of the computing frontiers conference, CF’17, Siena, Italy, May 15-17, 2017. pp. 409–414. https://doi.org/10.1145/3075564.3079069 (2017) Picek, S., Mariot, L., Yang, B., Jakobovic, D., Mentens, N.: Design of S-boxes defined with cellular automata rules. In: Proceedings of the computing frontiers conference, CF’17, Siena, Italy, May 15-17, 2017. pp. 409–414. https://​doi.​org/​10.​1145/​3075564.​3079069 (2017)
21.
Zurück zum Zitat Piret, G., Quisquater, J.: A differential fault attack technique against SPN structures, with application to the AES and KHAZAD. In: Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings. pp. 77–88. https://doi.org/10.1007/978-3-540-45238-6_7 (2003) Piret, G., Quisquater, J.: A differential fault attack technique against SPN structures, with application to the AES and KHAZAD. In: Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings. pp. 77–88. https://​doi.​org/​10.​1007/​978-3-540-45238-6_​7 (2003)
25.
Zurück zum Zitat Stallings, W.: Cryptography and network security - principles and practice (3. ed.), Prentice Hall (2003) Stallings, W.: Cryptography and network security - principles and practice (3. ed.), Prentice Hall (2003)
26.
Zurück zum Zitat Tunstall, M., Mukhopadhyay, D., Ali, S.: Differential fault analysis of the advanced encryption standard using a single fault. In: Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings. pp. 224–233. https://doi.org/10.1007/978-3-642-21040-2_15 (2011) Tunstall, M., Mukhopadhyay, D., Ali, S.: Differential fault analysis of the advanced encryption standard using a single fault. In: Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings. pp. 224–233. https://​doi.​org/​10.​1007/​978-3-642-21040-2_​15 (2011)
27.
Zurück zum Zitat Tupsamudre, H., Bisht, S., Mukhopadhyay, D.: Destroying fault invariant with randomization - A countermeasure for AES against differential fault attacks. In: Cryptographic Hardware and Embedded Systems - CHES 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings. pp. 93–111. https://doi.org/10.1007/978-3-662-44709-3_6 (2014) Tupsamudre, H., Bisht, S., Mukhopadhyay, D.: Destroying fault invariant with randomization - A countermeasure for AES against differential fault attacks. In: Cryptographic Hardware and Embedded Systems - CHES 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings. pp. 93–111. https://​doi.​org/​10.​1007/​978-3-662-44709-3_​6 (2014)
28.
Zurück zum Zitat Wolfram, S.: Cryptography with cellular automata. In: Advances in Cryptology - CRYPTO ’85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings. pp. 429–432 (1985) Wolfram, S.: Cryptography with cellular automata. In: Advances in Cryptology - CRYPTO ’85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings. pp. 429–432 (1985)
29.
Metadaten
Titel
Design of fault-resilient S-boxes for AES-like block ciphers
verfasst von
Swapan Maiti
Dipanwita Roy Chowdhury
Publikationsdatum
08.09.2020
Verlag
Springer US
Erschienen in
Cryptography and Communications / Ausgabe 1/2021
Print ISSN: 1936-2447
Elektronische ISSN: 1936-2455
DOI
https://doi.org/10.1007/s12095-020-00452-0

Weitere Artikel der Ausgabe 1/2021

Cryptography and Communications 1/2021 Zur Ausgabe