Skip to main content
Top

2019 | OriginalPaper | Chapter

8. Idempotent Instructions to Counter Fault Analysis Attacks

Authors : Sikhar Patranabis, Debdeep Mukhopadhyay

Published in: Automated Methods in Cryptographic Fault Analysis

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this chapter, we present an exposition to countermeasures against fault analysis via instruction-level redundancy in software. The presence of redundant instructions protects a software implementation against what are called “instruction-skip” attacks, wherein an adversary targeting a software-based crypto-implementation (e.g., on platform such as micro-controllers) might skip one or more instructions to leak secret information. The idea is to convert an instruction sequence that performs a specific task into a functionally equivalent sequence that is tolerant to skipping of a certain (pre-determined) number of instructions. In this context, we introduce the reader to “idempotent” instructions, which are instructions that may be duplicated without affecting the eventual outcome of the overall program. However, not all instructions may be simply duplicated; we show some non-trivial conversions of simple non-idempotent instructions into sequences of idempotent instructions that can then be made redundant via duplication. Finally, we discuss how to automate the process of compiling any program into a fault-tolerant sequence of assembly instructions via a case study on a modified LLVM compiler.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference J. Balasch, B. Gierlichs, I. Verbauwhede, An in-depth and black-box characterization of the effects of clock glitches on 8-bit MCUs, in 2011 Workshop on, Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, Piscataway, 2011), pp. 105–114 J. Balasch, B. Gierlichs, I. Verbauwhede, An in-depth and black-box characterization of the effects of clock glitches on 8-bit MCUs, in 2011 Workshop on, Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, Piscataway, 2011), pp. 105–114
2.
go back to reference A. Barenghi, L. Breveglieri, I. Koren, D. Naccache, Fault injection attacks on cryptographic devices: theory, practice, and countermeasures. Proc. IEEE 100(11), 3056–3076 (2012)CrossRef A. Barenghi, L. Breveglieri, I. Koren, D. Naccache, Fault injection attacks on cryptographic devices: theory, practice, and countermeasures. Proc. IEEE 100(11), 3056–3076 (2012)CrossRef
3.
go back to reference T. Barry, D. Couroussé, B. Robisson, Compilation of a countermeasure against instruction-skip fault attacks, in Proceedings of the Third Workshop on Cryptography and Security in Computing Systems (ACM, New York, 2016), pp. 1–6 T. Barry, D. Couroussé, B. Robisson, Compilation of a countermeasure against instruction-skip fault attacks, in Proceedings of the Third Workshop on Cryptography and Security in Computing Systems (ACM, New York, 2016), pp. 1–6
4.
go back to reference E. Biham, A fast new DES implementation in software, in International Workshop on Fast Software Encryption (Springer, Berlin, 1997), pp. 260–272MATH E. Biham, A fast new DES implementation in software, in International Workshop on Fast Software Encryption (Springer, Berlin, 1997), pp. 260–272MATH
5.
go back to reference D. Boneh, R.A. DeMillo, R.J. Lipton, On the importance of checking cryptographic protocols for faults (extended abstract), in Proceeding of the Advances in Cryptology - EUROCRYPT ’97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, 11–15 May 1997 (Springer, Berlin, 1997), pp. 37–51 D. Boneh, R.A. DeMillo, R.J. Lipton, On the importance of checking cryptographic protocols for faults (extended abstract), in Proceeding of the Advances in Cryptology - EUROCRYPT ’97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, 11–15 May 1997 (Springer, Berlin, 1997), pp. 37–51
6.
go back to reference A. Dehbaoui, J.-M Dutertre, B. Robisson, A. Tria, Electromagnetic transient faults injection on a hardware and a software implementations of AES, in 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, Piscataway, 2012), pp. 7–15 A. Dehbaoui, J.-M Dutertre, B. Robisson, A. Tria, Electromagnetic transient faults injection on a hardware and a software implementations of AES, in 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, Piscataway, 2012), pp. 7–15
7.
go back to reference P.C. Kocher, Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, in Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO ’96) (Springer, Berlin, 1996), pp. 104–113MATH P.C. Kocher, Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, in Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO ’96) (Springer, Berlin, 1996), pp. 104–113MATH
8.
go back to reference P. Kocher, J. Jaffe, B. Jun, Differential power analysis, in Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO ’99) (Springer, Berlin, 1999), pp. 388–397 P. Kocher, J. Jaffe, B. Jun, Differential power analysis, in Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO ’99) (Springer, Berlin, 1999), pp. 388–397
9.
go back to reference N. Moro, K. Heydemann, E. Encrenaz, B. Robisson, Formal verification of a software countermeasure against instruction skip attacks. J. Cryptogr. Eng. 4(3), 145–156 (2014)CrossRef N. Moro, K. Heydemann, E. Encrenaz, B. Robisson, Formal verification of a software countermeasure against instruction skip attacks. J. Cryptogr. Eng. 4(3), 145–156 (2014)CrossRef
10.
go back to reference J. Schmidt, C. Herbst, A practical fault attack on square and multiply, in 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography (IEEE, Piscataway, 2008), pp. 53–58 J. Schmidt, C. Herbst, A practical fault attack on square and multiply, in 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography (IEEE, Piscataway, 2008), pp. 53–58
11.
go back to reference J. Schmidt, M. Medwed, A fault attack on ECDSA, in 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, Piscataway, 2009), pp. 93–99CrossRef J. Schmidt, M. Medwed, A fault attack on ECDSA, in 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, Piscataway, 2009), pp. 93–99CrossRef
12.
go back to reference E. Trichina, R. Korkikyan, Multi fault laser attacks on protected CRT-RSA, in 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, Piscataway, 2010), pp. 75–86CrossRef E. Trichina, R. Korkikyan, Multi fault laser attacks on protected CRT-RSA, in 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, Piscataway, 2010), pp. 75–86CrossRef
Metadata
Title
Idempotent Instructions to Counter Fault Analysis Attacks
Authors
Sikhar Patranabis
Debdeep Mukhopadhyay
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-11333-9_8