Skip to main content

2019 | OriginalPaper | Buchkapitel

8. Idempotent Instructions to Counter Fault Analysis Attacks

verfasst von : Sikhar Patranabis, Debdeep Mukhopadhyay

Erschienen in: Automated Methods in Cryptographic Fault Analysis

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this chapter, we present an exposition to countermeasures against fault analysis via instruction-level redundancy in software. The presence of redundant instructions protects a software implementation against what are called “instruction-skip” attacks, wherein an adversary targeting a software-based crypto-implementation (e.g., on platform such as micro-controllers) might skip one or more instructions to leak secret information. The idea is to convert an instruction sequence that performs a specific task into a functionally equivalent sequence that is tolerant to skipping of a certain (pre-determined) number of instructions. In this context, we introduce the reader to “idempotent” instructions, which are instructions that may be duplicated without affecting the eventual outcome of the overall program. However, not all instructions may be simply duplicated; we show some non-trivial conversions of simple non-idempotent instructions into sequences of idempotent instructions that can then be made redundant via duplication. Finally, we discuss how to automate the process of compiling any program into a fault-tolerant sequence of assembly instructions via a case study on a modified LLVM compiler.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat J. Balasch, B. Gierlichs, I. Verbauwhede, An in-depth and black-box characterization of the effects of clock glitches on 8-bit MCUs, in 2011 Workshop on, Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, Piscataway, 2011), pp. 105–114 J. Balasch, B. Gierlichs, I. Verbauwhede, An in-depth and black-box characterization of the effects of clock glitches on 8-bit MCUs, in 2011 Workshop on, Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, Piscataway, 2011), pp. 105–114
2.
Zurück zum Zitat A. Barenghi, L. Breveglieri, I. Koren, D. Naccache, Fault injection attacks on cryptographic devices: theory, practice, and countermeasures. Proc. IEEE 100(11), 3056–3076 (2012)CrossRef A. Barenghi, L. Breveglieri, I. Koren, D. Naccache, Fault injection attacks on cryptographic devices: theory, practice, and countermeasures. Proc. IEEE 100(11), 3056–3076 (2012)CrossRef
3.
Zurück zum Zitat T. Barry, D. Couroussé, B. Robisson, Compilation of a countermeasure against instruction-skip fault attacks, in Proceedings of the Third Workshop on Cryptography and Security in Computing Systems (ACM, New York, 2016), pp. 1–6 T. Barry, D. Couroussé, B. Robisson, Compilation of a countermeasure against instruction-skip fault attacks, in Proceedings of the Third Workshop on Cryptography and Security in Computing Systems (ACM, New York, 2016), pp. 1–6
4.
Zurück zum Zitat E. Biham, A fast new DES implementation in software, in International Workshop on Fast Software Encryption (Springer, Berlin, 1997), pp. 260–272MATH E. Biham, A fast new DES implementation in software, in International Workshop on Fast Software Encryption (Springer, Berlin, 1997), pp. 260–272MATH
5.
Zurück zum Zitat D. Boneh, R.A. DeMillo, R.J. Lipton, On the importance of checking cryptographic protocols for faults (extended abstract), in Proceeding of the Advances in Cryptology - EUROCRYPT ’97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, 11–15 May 1997 (Springer, Berlin, 1997), pp. 37–51 D. Boneh, R.A. DeMillo, R.J. Lipton, On the importance of checking cryptographic protocols for faults (extended abstract), in Proceeding of the Advances in Cryptology - EUROCRYPT ’97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, 11–15 May 1997 (Springer, Berlin, 1997), pp. 37–51
6.
Zurück zum Zitat A. Dehbaoui, J.-M Dutertre, B. Robisson, A. Tria, Electromagnetic transient faults injection on a hardware and a software implementations of AES, in 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, Piscataway, 2012), pp. 7–15 A. Dehbaoui, J.-M Dutertre, B. Robisson, A. Tria, Electromagnetic transient faults injection on a hardware and a software implementations of AES, in 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, Piscataway, 2012), pp. 7–15
7.
Zurück zum Zitat P.C. Kocher, Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, in Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO ’96) (Springer, Berlin, 1996), pp. 104–113MATH P.C. Kocher, Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, in Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO ’96) (Springer, Berlin, 1996), pp. 104–113MATH
8.
Zurück zum Zitat P. Kocher, J. Jaffe, B. Jun, Differential power analysis, in Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO ’99) (Springer, Berlin, 1999), pp. 388–397 P. Kocher, J. Jaffe, B. Jun, Differential power analysis, in Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO ’99) (Springer, Berlin, 1999), pp. 388–397
9.
Zurück zum Zitat N. Moro, K. Heydemann, E. Encrenaz, B. Robisson, Formal verification of a software countermeasure against instruction skip attacks. J. Cryptogr. Eng. 4(3), 145–156 (2014)CrossRef N. Moro, K. Heydemann, E. Encrenaz, B. Robisson, Formal verification of a software countermeasure against instruction skip attacks. J. Cryptogr. Eng. 4(3), 145–156 (2014)CrossRef
10.
Zurück zum Zitat J. Schmidt, C. Herbst, A practical fault attack on square and multiply, in 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography (IEEE, Piscataway, 2008), pp. 53–58 J. Schmidt, C. Herbst, A practical fault attack on square and multiply, in 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography (IEEE, Piscataway, 2008), pp. 53–58
11.
Zurück zum Zitat J. Schmidt, M. Medwed, A fault attack on ECDSA, in 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, Piscataway, 2009), pp. 93–99CrossRef J. Schmidt, M. Medwed, A fault attack on ECDSA, in 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, Piscataway, 2009), pp. 93–99CrossRef
12.
Zurück zum Zitat E. Trichina, R. Korkikyan, Multi fault laser attacks on protected CRT-RSA, in 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, Piscataway, 2010), pp. 75–86CrossRef E. Trichina, R. Korkikyan, Multi fault laser attacks on protected CRT-RSA, in 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, Piscataway, 2010), pp. 75–86CrossRef
Metadaten
Titel
Idempotent Instructions to Counter Fault Analysis Attacks
verfasst von
Sikhar Patranabis
Debdeep Mukhopadhyay
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-11333-9_8

Neuer Inhalt