Skip to main content

2019 | OriginalPaper | Buchkapitel

9. Differential Fault Attack Resistant Hardware Design Automation

verfasst von : Mustafa Khairallah, Jakub Breier, Shivam Bhasin, Anupam Chattopadhyay

Erschienen in: Automated Methods in Cryptographic Fault Analysis

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Since fault analysis had shown that nearly all cryptographic primitives to be vulnerable, countermeasures against such attacks are becoming a necessity. Available countermeasures are either added at the algorithmic level or at the implementation level and incur performance, area and power consumption overhead. Therefore, a trade-off analysis of security and performance needs to be done during the design phase. In this chapter, we discuss an implementation-level countermeasure that can be easily automated and integrated into the commercial circuit design flows, making the task of implementing these countermeasures easier for hardware designers.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat A. Baksi, S. Bhasin, J. Breier, M. Khairallah, T. Peyrin, Protecting block ciphers against differential fault attacks without re-keying, in 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (IEEE, Piscataway, 2018), pp. 191–194CrossRef A. Baksi, S. Bhasin, J. Breier, M. Khairallah, T. Peyrin, Protecting block ciphers against differential fault attacks without re-keying, in 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (IEEE, Piscataway, 2018), pp. 191–194CrossRef
2.
Zurück zum Zitat H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, C. Whelan, The sorcerer’s apprentice guide to fault attacks. Proc. IEEE 94(2), 370–382 (2006)CrossRef H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, C. Whelan, The sorcerer’s apprentice guide to fault attacks. Proc. IEEE 94(2), 370–382 (2006)CrossRef
3.
Zurück zum Zitat A. Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J. Robshaw, Y. Seurin, C. Vikkelsoe, PRESENT: an ultra-lightweight block cipher, in Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ’07 (Springer, Berlin, 2007), pp. 450–466MATH A. Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J. Robshaw, Y. Seurin, C. Vikkelsoe, PRESENT: an ultra-lightweight block cipher, in Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ’07 (Springer, Berlin, 2007), pp. 450–466MATH
4.
Zurück zum Zitat J. Breier, C.N. Chen, On determining optimal parameters for testing devices against laser fault attacks, in 2016 International Symposium on Integrated Circuits (ISIC) (2016) J. Breier, C.N. Chen, On determining optimal parameters for testing devices against laser fault attacks, in 2016 International Symposium on Integrated Circuits (ISIC) (2016)
5.
Zurück zum Zitat J.-P. Deschamps, J.L. Imaña, G.D. Sutter, Hardware Implementation of Finite-Field Arithmetic (McGraw-Hill, New York, 2009) J.-P. Deschamps, J.L. Imaña, G.D. Sutter, Hardware Implementation of Finite-Field Arithmetic (McGraw-Hill, New York, 2009)
6.
Zurück zum Zitat C. Dobraunig, M. Eichlseder, S. Mangard, F. Mendel, On the security of fresh re-keying to counteract side-channel and fault attacks, in International Conference on Smart Card Research and Advanced Applications (2014), pp. 233–244 C. Dobraunig, M. Eichlseder, S. Mangard, F. Mendel, On the security of fresh re-keying to counteract side-channel and fault attacks, in International Conference on Smart Card Research and Advanced Applications (2014), pp. 233–244
7.
Zurück zum Zitat C. Dobraunig, F. Koeune, S. Mangard, F. Mendel, F.-X. Standaert, Towards fresh and hybrid re-keying schemes with beyond birthday security, in International Conference on Smart Card Research and Advanced Applications (2015), pp. 225–241 C. Dobraunig, F. Koeune, S. Mangard, F. Mendel, F.-X. Standaert, Towards fresh and hybrid re-keying schemes with beyond birthday security, in International Conference on Smart Card Research and Advanced Applications (2015), pp. 225–241
8.
Zurück zum Zitat P.-A. Fouque, R. Lercier, D. Réal, F. Valette, Fault attack on elliptic curve Montgomery ladder implementation, in Proceedings of FDTC (2008), pp. 92–98 P.-A. Fouque, R. Lercier, D. Réal, F. Valette, Fault attack on elliptic curve Montgomery ladder implementation, in Proceedings of FDTC (2008), pp. 92–98
9.
Zurück zum Zitat M.C. Hansen, H. Yalcin, J.P. Hayes, Unveiling the ISCAS-85 benchmarks: a case study in reverse engineering. IEEE Des. Test Comput. 16(3), 72–80 (1999)CrossRef M.C. Hansen, H. Yalcin, J.P. Hayes, Unveiling the ISCAS-85 benchmarks: a case study in reverse engineering. IEEE Des. Test Comput. 16(3), 72–80 (1999)CrossRef
10.
Zurück zum Zitat W. He, J. Breier, S. Bhasin, Cheap and cheerful: a low-cost digital sensor for detecting laser fault injection attacks, in International Conference on Security, Privacy, and Applied Cryptography Engineering (2016), pp. 27–46 W. He, J. Breier, S. Bhasin, Cheap and cheerful: a low-cost digital sensor for detecting laser fault injection attacks, in International Conference on Security, Privacy, and Applied Cryptography Engineering (2016), pp. 27–46
11.
Zurück zum Zitat W. He, J. Breier, S. Bhasin, A. Chattopadhyay, Bypassing parity protected cryptography using laser fault injection in cyber-physical system, in Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security (2016), pp. 15–21 W. He, J. Breier, S. Bhasin, A. Chattopadhyay, Bypassing parity protected cryptography using laser fault injection in cyber-physical system, in Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security (2016), pp. 15–21
12.
Zurück zum Zitat W. He, J. Breier, S. Bhasin, N. Miura, M. Nagata, Ring oscillator under laser: potential of PLL-based countermeasure against laser fault injection, in Proceedings of FDTC (IEEE, Piscataway, 2016), pp. 102–113 W. He, J. Breier, S. Bhasin, N. Miura, M. Nagata, Ring oscillator under laser: potential of PLL-based countermeasure against laser fault injection, in Proceedings of FDTC (IEEE, Piscataway, 2016), pp. 102–113
13.
Zurück zum Zitat R. Karri, G. Kuznetsov, M. Goessel, Parity-based concurrent error detection of substitution-permutation network block ciphers, in Proceedings of CHES (2003), pp. 113–124 R. Karri, G. Kuznetsov, M. Goessel, Parity-based concurrent error detection of substitution-permutation network block ciphers, in Proceedings of CHES (2003), pp. 113–124
14.
Zurück zum Zitat M. Khairallah, R. Sadhukhan, R. Samanta, J. Breier, S. Bhasin, R.S. Chakraborty, A. Chattopadhyay, D. Mukhopadhyay, DFARPA: differential fault attack resistant physical design automation, in Design, Automation & Test in Europe Conference & Exhibition (DATE), 2018 (IEEE, Piscataway, 2018), pp. 1171–1174CrossRef M. Khairallah, R. Sadhukhan, R. Samanta, J. Breier, S. Bhasin, R.S. Chakraborty, A. Chattopadhyay, D. Mukhopadhyay, DFARPA: differential fault attack resistant physical design automation, in Design, Automation & Test in Europe Conference & Exhibition (DATE), 2018 (IEEE, Piscataway, 2018), pp. 1171–1174CrossRef
15.
Zurück zum Zitat V. Lomné, T. Roche, A. Thillard, On the need of randomness in fault attack countermeasures-application to AES, in Proceedings of FDTC (2012), pp. 85–94 V. Lomné, T. Roche, A. Thillard, On the need of randomness in fault attack countermeasures-application to AES, in Proceedings of FDTC (2012), pp. 85–94
16.
Zurück zum Zitat M. Medwed, F.-X. Standaert, J. Großschädl, F. Regazzoni, Fresh re-keying: security against side-channel and fault attacks for low-cost devices, in International Conference on Cryptology in Africa (Springer, Berlin, 2010), pp. 279–296MATH M. Medwed, F.-X. Standaert, J. Großschädl, F. Regazzoni, Fresh re-keying: security against side-channel and fault attacks for low-cost devices, in International Conference on Cryptology in Africa (Springer, Berlin, 2010), pp. 279–296MATH
17.
Zurück zum Zitat X.T. Ngo, J.-L. Danger, S. Guilley, T. Graba, Y. Mathieu, Z. Najm, S. Bhasin, Cryptographically secure shield for security IPS protection. IEEE Trans. Comput. 66, 354–360 (2017)MathSciNetMATH X.T. Ngo, J.-L. Danger, S. Guilley, T. Graba, Y. Mathieu, Z. Najm, S. Bhasin, Cryptographically secure shield for security IPS protection. IEEE Trans. Comput. 66, 354–360 (2017)MathSciNetMATH
Metadaten
Titel
Differential Fault Attack Resistant Hardware Design Automation
verfasst von
Mustafa Khairallah
Jakub Breier
Shivam Bhasin
Anupam Chattopadhyay
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-11333-9_9

Neuer Inhalt