Skip to main content
Erschienen in: Journal of Cryptographic Engineering 2/2021

30.05.2020 | Regular Paper

Detecting faults in inner product masking scheme

IPM-FD: IPM with fault detection (extended version)

verfasst von: Wei Cheng, Claude Carlet, Kouassi Goli, Jean-Luc Danger, Sylvain Guilley

Erschienen in: Journal of Cryptographic Engineering | Ausgabe 2/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Side-channel analysis and fault injection attacks are two typical threats to cryptographic implementations, especially in modern embedded devices. Thus, there is an insistent demand for dual side-channel and fault injection protections. As we know, masking is a kind of provable countermeasure against side-channel attacks. Recently, inner product masking (IPM) was proposed as a promising higher-order masking scheme against side-channel analysis, but not for fault injection attacks. In this paper, we devise a new masking scheme named IPM-FD. It is built on IPM, which enables fault detection. This novel masking scheme has three properties: the security orders in the word-level probing model, bit-level probing model and the number of detected faults. IPM-FD is proven secure both in the word-level and in the bit-level probing models and allows for end-to-end fault detection against fault injection attacks. Furthermore, we illustrate its security order by interpreting IPM-FD as a coding problem and then linking it to one defining parameters of linear code and show its implementation cost by applying IPM-FD to AES-128.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
BKLC is the short of the best known linear code in Magma [35].
 
Literatur
1.
Zurück zum Zitat Ali, Subidh, Mukhopadhyay, Debdeep, Tunstall, Michael: Differential fault analysis of AES: towards reaching its limits. J. Cryptogr. Eng. 3(2), 73–97 (2013)CrossRef Ali, Subidh, Mukhopadhyay, Debdeep, Tunstall, Michael: Differential fault analysis of AES: towards reaching its limits. J. Cryptogr. Eng. 3(2), 73–97 (2013)CrossRef
2.
Zurück zum Zitat Balasch, J., Faust, S., Gierlichs, B.: Inner product masking revisited. In: Elisabeth, O., Marc F., editors, Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I, volume 9056 of Lecture Notes in Computer Science, pp 486–510. Springer, (2015) Balasch, J., Faust, S., Gierlichs, B.: Inner product masking revisited. In: Elisabeth, O., Marc F., editors, Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I, volume 9056 of Lecture Notes in Computer Science, pp 486–510. Springer, (2015)
3.
Zurück zum Zitat Balasch, J., Faust, S., Gierlichs, B., Paglialonga, C., Standaert, F.-X.: Consolidating inner product masking. In: Tsuyoshi Takagi and Thomas Peyrin, editors, Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I, volume 10624 of Lecture Notes in Computer Science, pp. 724–754. Springer, (2017) Balasch, J., Faust, S., Gierlichs, B., Paglialonga, C., Standaert, F.-X.: Consolidating inner product masking. In: Tsuyoshi Takagi and Thomas Peyrin, editors, Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I, volume 10624 of Lecture Notes in Computer Science, pp. 724–754. Springer, (2017)
4.
Zurück zum Zitat Barthe, Gilles, Belaïd, Sonia, Dupressoir, François, Fouque, Pierre-Alain, Grégoire, Benjamin: Compositional verification of higher-order masking: application to a verifying masking compiler. IACR Cryptol. ePrint Arch. 2015, 506 (2015) Barthe, Gilles, Belaïd, Sonia, Dupressoir, François, Fouque, Pierre-Alain, Grégoire, Benjamin: Compositional verification of higher-order masking: application to a verifying masking compiler. IACR Cryptol. ePrint Arch. 2015, 506 (2015)
5.
Zurück zum Zitat Bringer, J., Carlet, C., Chabanne, H., Guilley, S., Maghrebi, H.: Orthogonal direct sum masking—a smartcard friendly computation paradigm in a code, with builtin protection against side-channel and fault attacks. In: David Naccache and Damien Sauveron, editors, Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings, volume 8501 of Lecture Notes in Computer Science, pp. 40–56. Springer, (2014) Bringer, J., Carlet, C., Chabanne, H., Guilley, S., Maghrebi, H.: Orthogonal direct sum masking—a smartcard friendly computation paradigm in a code, with builtin protection against side-channel and fault attacks. In: David Naccache and Damien Sauveron, editors, Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings, volume 8501 of Lecture Notes in Computer Science, pp. 40–56. Springer, (2014)
6.
Zurück zum Zitat Carlet, C., Güneri, C., Mesnager, S., Özbudak, F.: Construction of some codes suitable for both side channel and fault injection attacks. In: Lilya Budaghyan and Francisco Rodríguez-Henríquez, editors, Arithmetic of Finite Fields—7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers, volume 11321 of Lecture Notes in Computer Science, pp. 95–107. Springer, (2018) Carlet, C., Güneri, C., Mesnager, S., Özbudak, F.: Construction of some codes suitable for both side channel and fault injection attacks. In: Lilya Budaghyan and Francisco Rodríguez-Henríquez, editors, Arithmetic of Finite Fields—7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers, volume 11321 of Lecture Notes in Computer Science, pp. 95–107. Springer, (2018)
7.
Zurück zum Zitat Chakraborty, Abhishek, Mazumdar, Bodhisatwa, Mukhopadhyay, Debdeep: A combined power and fault analysis attack on protected grain family of stream ciphers. IEEE Trans. CAD Integr. Circuits Syst. 36(12), 1968–1977 (2017)CrossRef Chakraborty, Abhishek, Mazumdar, Bodhisatwa, Mukhopadhyay, Debdeep: A combined power and fault analysis attack on protected grain family of stream ciphers. IEEE Trans. CAD Integr. Circuits Syst. 36(12), 1968–1977 (2017)CrossRef
8.
Zurück zum Zitat Cheng, W., Carlet, C., Goli, K., Danger, J.-L., Guilley, S.: Detecting faults in inner product masking scheme—IPM-FD: IPM with fault detection, August 24 2019. In: 8th International Workshop on Security Proofs for Embedded Systems (PROOFS). Atlanta, GA, USA (2019) Cheng, W., Carlet, C., Goli, K., Danger, J.-L., Guilley, S.: Detecting faults in inner product masking scheme—IPM-FD: IPM with fault detection, August 24 2019. In: 8th International Workshop on Security Proofs for Embedded Systems (PROOFS). Atlanta, GA, USA (2019)
13.
Zurück zum Zitat Coron, J.-S.: Higher order masking of look-up tables. In: Phong Q. Nguyen and Elisabeth Oswald, editors, EUROCRYPT, volume 8441 of Lecture Notes in Computer Science, pp. 441–458. Springer (2014) Coron, J.-S.: Higher order masking of look-up tables. In: Phong Q. Nguyen and Elisabeth Oswald, editors, EUROCRYPT, volume 8441 of Lecture Notes in Computer Science, pp. 441–458. Springer (2014)
14.
Zurück zum Zitat Coron, J.-S., Prouff, E., Rivain, M.: Side channel cryptanalysis of a higher order masking scheme. In: Pascal, P., Ingrid, V., editors, CHES, volume 4727 of LNCS, pp. 28–44. Springer (2007) Coron, J.-S., Prouff, E., Rivain, M.: Side channel cryptanalysis of a higher order masking scheme. In: Pascal, P., Ingrid, V., editors, CHES, volume 4727 of LNCS, pp. 28–44. Springer (2007)
15.
Zurück zum Zitat Danger, Jean-Luc, Guilley, Sylvain, Heuser, Annelie, Legay, Axel, Tang, Ming: Physical security versus masking schemes. In: Koç, Çetin Kaya (ed.) Cyber-Physical Systems Security, pp. 269–284. Springer, Berlin (2018)CrossRef Danger, Jean-Luc, Guilley, Sylvain, Heuser, Annelie, Legay, Axel, Tang, Ming: Physical security versus masking schemes. In: Koç, Çetin Kaya (ed.) Cyber-Physical Systems Security, pp. 269–284. Springer, Berlin (2018)CrossRef
16.
Zurück zum Zitat Denis, F.: The Sodium cryptography library, Jul (2019) Denis, F.: The Sodium cryptography library, Jul (2019)
17.
Zurück zum Zitat Ishai, Y., Sahai, A., Wagner, D.: Private circuits: securing hardware against probing attacks. In: CRYPTO, volume 2729 of Lecture Notes in Computer Science, pp. 463–481. Springer, August 17–21 2003. Santa Barbara, California, USA (2003) Ishai, Y., Sahai, A., Wagner, D.: Private circuits: securing hardware against probing attacks. In: CRYPTO, volume 2729 of Lecture Notes in Computer Science, pp. 463–481. Springer, August 17–21 2003. Santa Barbara, California, USA (2003)
18.
Zurück zum Zitat Karpovsky, M.G., Kulikowski, K.J., Wang, Z.: Robust error detection in communication and computation channels. In: in Proceedings of International Workshop on Spectral Techniques (2007) Karpovsky, M.G., Kulikowski, K.J., Wang, Z.: Robust error detection in communication and computation channels. In: in Proceedings of International Workshop on Spectral Techniques (2007)
19.
Zurück zum Zitat Karpovsky, Mark G., Nagvajara, Prawat: Optimal codes for minimax criterion on error detection. IEEE Trans. Inf. Theory 35(6), 1299–1305 (1989)MathSciNetCrossRef Karpovsky, Mark G., Nagvajara, Prawat: Optimal codes for minimax criterion on error detection. IEEE Trans. Inf. Theory 35(6), 1299–1305 (1989)MathSciNetCrossRef
20.
Zurück zum Zitat Karpovsky, Mark G., Taubin, Alexander: New class of nonlinear systematic error detecting codes. IEEE Trans. Inf. Theory 50(8), 1818–1820 (2004)MathSciNetCrossRef Karpovsky, Mark G., Taubin, Alexander: New class of nonlinear systematic error detecting codes. IEEE Trans. Inf. Theory 50(8), 1818–1820 (2004)MathSciNetCrossRef
21.
Zurück zum Zitat Kirschbaum, M., Popp, T.: Evaluation of a DPA-resistant prototype chip. In: ACSAC, pp. 43–50. IEEE Computer Society, 7-11 December 2009. Honolulu, Hawaii (2009) Kirschbaum, M., Popp, T.: Evaluation of a DPA-resistant prototype chip. In: ACSAC, pp. 43–50. IEEE Computer Society, 7-11 December 2009. Honolulu, Hawaii (2009)
22.
Zurück zum Zitat Jessie MacWilliams, F., Sloane, Neil J .A.: The Theory of Error-Correcting Codes. Elsevier, Amsterdam, North Holland (1977). ISBN: 978-0-444-85193-2MATH Jessie MacWilliams, F., Sloane, Neil J .A.: The Theory of Error-Correcting Codes. Elsevier, Amsterdam, North Holland (1977). ISBN: 978-0-444-85193-2MATH
23.
Zurück zum Zitat MacWilliams, F.J., Sloane, N.J.A. Neil James A.: The theory of error correcting codes. North-Holland mathematical library. North-Holland Pub. Co. New York, Amsterdam, New York, 1977. Includes index (1977) MacWilliams, F.J., Sloane, N.J.A. Neil James A.: The theory of error correcting codes. North-Holland mathematical library. North-Holland Pub. Co. New York, Amsterdam, New York, 1977. Includes index (1977)
24.
25.
Zurück zum Zitat Messerges, T.S.: Securing the AES finalists against power analysis attacks. In: Bruce Schneier, editor, Fast Software Encryption, 7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000, Proceedings, volume 1978 of Lecture Notes in Computer Science, pp. 150–164. Springer (2000) Messerges, T.S.: Securing the AES finalists against power analysis attacks. In: Bruce Schneier, editor, Fast Software Encryption, 7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000, Proceedings, volume 1978 of Lecture Notes in Computer Science, pp. 150–164. Springer (2000)
26.
Zurück zum Zitat Monteiro, C., Takahashi, Y., Sekine, T.: Low power secure AES S-box using adiabatic logic circuit. In: 2013 IEEE Faible Tension Faible Consommation, pp. 1–4, June (2013) Monteiro, C., Takahashi, Y., Sekine, T.: Low power secure AES S-box using adiabatic logic circuit. In: 2013 IEEE Faible Tension Faible Consommation, pp. 1–4, June (2013)
27.
Zurück zum Zitat Moore, Simon, Anderson, Ross, Mullins, Robert, Taylor, George, Fournier, Jacques JA: Balanced self-checking asynchronous logic for smart card applications. J. Microprocess. Microsyst. 27(9), 421–430 (2003)CrossRef Moore, Simon, Anderson, Ross, Mullins, Robert, Taylor, George, Fournier, Jacques JA: Balanced self-checking asynchronous logic for smart card applications. J. Microprocess. Microsyst. 27(9), 421–430 (2003)CrossRef
28.
Zurück zum Zitat Ngo, X.T., Bhasin, S., Danger, J.-L., Guilley, S., Najm, Z.: Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses. In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 82–87. IEEE (2015) Ngo, X.T., Bhasin, S., Danger, J.-L., Guilley, S., Najm, Z.: Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses. In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 82–87. IEEE (2015)
29.
Zurück zum Zitat Patranabis, S., Chakraborty, A., Nguyen, P.H., Mukhopadhyay, D.: A biased fault attack on the time redundancy countermeasure for AES. In: Stefan, M., Axel, Y.P., editors, Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers, volume 9064 of Lecture Notes in Computer Science, pp. 189–203. Springer (2015) Patranabis, S., Chakraborty, A., Nguyen, P.H., Mukhopadhyay, D.: A biased fault attack on the time redundancy countermeasure for AES. In: Stefan, M., Axel, Y.P., editors, Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers, volume 9064 of Lecture Notes in Computer Science, pp. 189–203. Springer (2015)
30.
Zurück zum Zitat Poussier, R., Guo, Q., Standaert, F.-X., Carlet, C., Guilley, S.: Connecting and improving direct sum masking and inner product masking. In: Thomas, E., Yannick, T., editors, Smart Card Research and Advanced Applications—16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13-15, 2017, Revised Selected Papers, volume 10728 of Lecture Notes in Computer Science, pp. 123–141. Springer (2017) Poussier, R., Guo, Q., Standaert, F.-X., Carlet, C., Guilley, S.: Connecting and improving direct sum masking and inner product masking. In: Thomas, E., Yannick, T., editors, Smart Card Research and Advanced Applications—16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13-15, 2017, Revised Selected Papers, volume 10728 of Lecture Notes in Computer Science, pp. 123–141. Springer (2017)
31.
Zurück zum Zitat Rivain, M., Prouff, E.: Provably secure higher-order masking of AES. In: Stefan, M., François-Xavier, S., editors, CHES, volume 6225 of LNCS, pp. 413–427. Springer (2010) Rivain, M., Prouff, E.: Provably secure higher-order masking of AES. In: Stefan, M., François-Xavier, S., editors, CHES, volume 6225 of LNCS, pp. 413–427. Springer (2010)
32.
Zurück zum Zitat Saha, S., Jap, D., Breier, J., Bhasin, S., Mukhopadhyay, D., Dasgupta, P.: Breaking redundancy-based countermeasures with random faults and power side channel. In: 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2018, Amsterdam, The Netherlands, September 13, 2018, pp. 15–22. IEEE Computer Society (2018) Saha, S., Jap, D., Breier, J., Bhasin, S., Mukhopadhyay, D., Dasgupta, P.: Breaking redundancy-based countermeasures with random faults and power side channel. In: 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2018, Amsterdam, The Netherlands, September 13, 2018, pp. 15–22. IEEE Computer Society (2018)
33.
Zurück zum Zitat Schneider, T., Moradi, A., Güneysu, T.: Parti - towards combined hardware countermeasures against side-channel and fault-injection attacks. In: Matthew Robshaw and Jonathan Katz, editors, Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II, volume 9815 of Lecture Notes in Computer Science, pp. 302–332. Springer (2016) Schneider, T., Moradi, A., Güneysu, T.: Parti - towards combined hardware countermeasures against side-channel and fault-injection attacks. In: Matthew Robshaw and Jonathan Katz, editors, Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II, volume 9815 of Lecture Notes in Computer Science, pp. 302–332. Springer (2016)
34.
36.
Zurück zum Zitat Wang, W., Standaert, F.-X., Yu, Y., Pu, S., Liu, J., Guo, Z., Gu, D.: Inner product masking for bitslice ciphers and security order amplification for linear leakages. In: Kerstin, L.-R., Michael, T., editors, Smart Card Research and Advanced Applications - 15th International Conference, CARDIS 2016, Cannes, France, November 7-9, 2016, Revised Selected Papers, volume 10146 of Lecture Notes in Computer Science, pp. 174–191. Springer (2016) Wang, W., Standaert, F.-X., Yu, Y., Pu, S., Liu, J., Guo, Z., Gu, D.: Inner product masking for bitslice ciphers and security order amplification for linear leakages. In: Kerstin, L.-R., Michael, T., editors, Smart Card Research and Advanced Applications - 15th International Conference, CARDIS 2016, Cannes, France, November 7-9, 2016, Revised Selected Papers, volume 10146 of Lecture Notes in Computer Science, pp. 174–191. Springer (2016)
Metadaten
Titel
Detecting faults in inner product masking scheme
IPM-FD: IPM with fault detection (extended version)
verfasst von
Wei Cheng
Claude Carlet
Kouassi Goli
Jean-Luc Danger
Sylvain Guilley
Publikationsdatum
30.05.2020
Verlag
Springer Berlin Heidelberg
Erschienen in
Journal of Cryptographic Engineering / Ausgabe 2/2021
Print ISSN: 2190-8508
Elektronische ISSN: 2190-8516
DOI
https://doi.org/10.1007/s13389-020-00227-6

Weitere Artikel der Ausgabe 2/2021

Journal of Cryptographic Engineering 2/2021 Zur Ausgabe