Skip to main content
Erschienen in: Journal of Cryptographic Engineering 1/2017

28.10.2016 | Special Section On Proofs 2015

Using linear codes as a fault countermeasure for nonlinear operations: application to AES and formal verification

verfasst von: Sabine Azzi, Bruno Barras, Maria Christofi, David Vigilant

Erschienen in: Journal of Cryptographic Engineering | Ausgabe 1/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently, Bringer et al. [10] introduced a new countermeasure based on linear codes. This elegant design aims at protecting advanced encryption standard against both side-channel attacks and fault attacks (FA). However, the fault detection during nonlinear operations (for example SubBytes operation) was left as an open question. The present work studies how linear systematic error correcting codes can simply be used to detect fault injections during nonlinear operations in a symmetric block cipher. In particular, for the faults that cause errors with limited Hamming weight, this method can lead to interesting detection capabilities. Considering this way of protecting AES encryption against FA, a concrete implementation is presented. For a given fault model, a methodology of formal verification is applied to some parts of this implementation, assessing the fault resistance of one linear operation AddRoundKey and one nonlinear operation SubBytes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
A list and analysis of existing CED techniques can be found in [20].
 
2
known as CIS code [11].
 
Literatur
2.
Zurück zum Zitat Anderson, R., Kuhn, M.: Low cost attacks on tamper-resistant devices. In: Security Protocols 5th International Workshop, pp. 125–136 (1997) Anderson, R., Kuhn, M.: Low cost attacks on tamper-resistant devices. In: Security Protocols 5th International Workshop, pp. 125–136 (1997)
3.
Zurück zum Zitat Barthe, G., Belaïd, S., Dupressoir, F., Fouque, P., Grégoire, B., Strub, P.: Verified proofs of higher-order masking. In: Advances in Cryptology—EUROCRYPT 2015, 457–485 (2015) Barthe, G., Belaïd, S., Dupressoir, F., Fouque, P., Grégoire, B., Strub, P.: Verified proofs of higher-order masking. In: Advances in Cryptology—EUROCRYPT 2015, 457–485 (2015)
6.
Zurück zum Zitat Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: CRYPTO ’97, pp. 513–525 (1997) Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: CRYPTO ’97, pp. 513–525 (1997)
8.
Zurück zum Zitat Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of eliminating errors in cryptographic computations. J. Cryptol. 14(2), 101–119 (2001)MathSciNetCrossRefMATH Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of eliminating errors in cryptographic computations. J. Cryptol. 14(2), 101–119 (2001)MathSciNetCrossRefMATH
9.
Zurück zum Zitat Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Cryptographic Hardware and Embedded Systems—CHES 2004, CHES ’04, pp. 16–29 (2004) Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Cryptographic Hardware and Embedded Systems—CHES 2004, CHES ’04, pp. 16–29 (2004)
10.
Zurück zum Zitat Bringer, J., Carlet, C., Chabanne, H., Guilley, S., Maghrebi, H.: Orthogonal direct sum masking—a smartcard friendly computation paradigm in a code, with builtin protection against side-channel and fa. In: Information Security Theory and Practice. Securing the Internet of Things, pp. 40–56 (2014) Bringer, J., Carlet, C., Chabanne, H., Guilley, S., Maghrebi, H.: Orthogonal direct sum masking—a smartcard friendly computation paradigm in a code, with builtin protection against side-channel and fa. In: Information Security Theory and Practice. Securing the Internet of Things, pp. 40–56 (2014)
11.
Zurück zum Zitat Carlet, C., Gaborit, P., Kim, J., Solé, P.: A new class of codes for boolean masking of cryptographic computations. IEEE Trans. Inf. Theory 58(9), 6000–6011 (2012)MathSciNetCrossRef Carlet, C., Gaborit, P., Kim, J., Solé, P.: A new class of codes for boolean masking of cryptographic computations. IEEE Trans. Inf. Theory 58(9), 6000–6011 (2012)MathSciNetCrossRef
12.
Zurück zum Zitat Christofi, M.: Security proofs of cryptographic implementations. Thesis report (2013) Christofi, M.: Security proofs of cryptographic implementations. Thesis report (2013)
13.
14.
Zurück zum Zitat Coron, J.S., Roy, A., Vivek, S.: Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures. In: Cryptographic Hardware and Embedded Systems—CHES 2014, pp. 170–187 (2014) Coron, J.S., Roy, A., Vivek, S.: Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures. In: Cryptographic Hardware and Embedded Systems—CHES 2014, pp. 170–187 (2014)
15.
Zurück zum Zitat Courbon, F., Loubet-Moundi, P., Fournier, J., Tria, A.: Adjusting laser injections for fully controlled faults. In: COSADE 2014, Lecture Notes in Computer Science, vol. 8622, pp. 229–242. Springer International Publishing (2014) Courbon, F., Loubet-Moundi, P., Fournier, J., Tria, A.: Adjusting laser injections for fully controlled faults. In: COSADE 2014, Lecture Notes in Computer Science, vol. 8622, pp. 229–242. Springer International Publishing (2014)
16.
18.
Zurück zum Zitat Gierlichs, B., Schmidt, J.M., Tunstall, M.: Infective computation and dummy rounds: fault protection for block ciphers without check-before-output. Cryptology ePrint Archive, Report 2012/678 (2012) Gierlichs, B., Schmidt, J.M., Tunstall, M.: Infective computation and dummy rounds: fault protection for block ciphers without check-before-output. Cryptology ePrint Archive, Report 2012/678 (2012)
20.
Zurück zum Zitat Guo, X., Mukhopadhyay, D., Karri, K.: Provably secure concurrent error detection against differential fault analysis. Cryptology ePrint Archive, Report 2012/552 (2012). http://eprint.iacr.org/ Guo, X., Mukhopadhyay, D., Karri, K.: Provably secure concurrent error detection against differential fault analysis. Cryptology ePrint Archive, Report 2012/552 (2012). http://​eprint.​iacr.​org/​
22.
24.
Zurück zum Zitat Karpovsky, M., Kulikowski, K., Taubin, A.: Robust protection against fault-injection attacks on smart cards implementing the aes. In: 2004 International Conference on Dependable Systems and Networks, pp. 93–101 (2004). doi:10.1109/DSN.2004.1311880 Karpovsky, M., Kulikowski, K., Taubin, A.: Robust protection against fault-injection attacks on smart cards implementing the aes. In: 2004 International Conference on Dependable Systems and Networks, pp. 93–101 (2004). doi:10.​1109/​DSN.​2004.​1311880
25.
Zurück zum Zitat Karri, R., Wu, K., Mishra, P., Kim, Y.: Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers. IEEE Trans. CAD Integr. Circuits Syst. 21(12), 1509–1517 (2002). doi:10.1109/TCAD.2002.804378 CrossRef Karri, R., Wu, K., Mishra, P., Kim, Y.: Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers. IEEE Trans. CAD Integr. Circuits Syst. 21(12), 1509–1517 (2002). doi:10.​1109/​TCAD.​2002.​804378 CrossRef
27.
Zurück zum Zitat Leveugle, R., Ammari, A., Maingot, V., Teyssou, E., Moitrel, P., Mourtel, C., Feyt, N., Rigaud, J.B., Tria, A.: Experimental evaluation of protections against laser-induced faults and consequences on fault modeling. In: Design, Automation Test in Europe Conference Exhibition, 2007. DATE ’07, pp. 1–6 (2007) Leveugle, R., Ammari, A., Maingot, V., Teyssou, E., Moitrel, P., Mourtel, C., Feyt, N., Rigaud, J.B., Tria, A.: Experimental evaluation of protections against laser-induced faults and consequences on fault modeling. In: Design, Automation Test in Europe Conference Exhibition, 2007. DATE ’07, pp. 1–6 (2007)
28.
Zurück zum Zitat Malkin, T., Standaert, F.X., Yung, M.: A comparative cost/security analysis of fa countermeasures. In: Workshop FDTC 2006. Lecture Notes in Computer Science, vol. 4236, pp. 159–172. Springer, Berlin Heidelberg (2006) Malkin, T., Standaert, F.X., Yung, M.: A comparative cost/security analysis of fa countermeasures. In: Workshop FDTC 2006. Lecture Notes in Computer Science, vol. 4236, pp. 159–172. Springer, Berlin Heidelberg (2006)
30.
Zurück zum Zitat Meola, M.L., Walker, D.: Faulty logic: Reasoning about fault tolerant programs. In: Programming Languages and Systems, ESOP 2010, Lecture Notes in Computer Science, vol. 6012, pp. 468–487. Springer (2010) Meola, M.L., Walker, D.: Faulty logic: Reasoning about fault tolerant programs. In: Programming Languages and Systems, ESOP 2010, Lecture Notes in Computer Science, vol. 6012, pp. 468–487. Springer (2010)
31.
Zurück zum Zitat Moradi, A., Shalmani, M., Salmasizadeh, M.: A generalized method of DFA against AES cryptosystem. In: Cryptographic Hardware and Embedded Systems—CHES 2006, pp. 91–100 (2006) Moradi, A., Shalmani, M., Salmasizadeh, M.: A generalized method of DFA against AES cryptosystem. In: Cryptographic Hardware and Embedded Systems—CHES 2006, pp. 91–100 (2006)
32.
Zurück zum Zitat Mukhopadhyay, D.: An improved fault based attack of the advanced encryption standard. In: AFRICACRYPT 2009. Lecture Notes in Computer Science, vol. 5580, pp. 421–434. Springer, Berlin Heidelberg (2009) Mukhopadhyay, D.: An improved fault based attack of the advanced encryption standard. In: AFRICACRYPT 2009. Lecture Notes in Computer Science, vol. 5580, pp. 421–434. Springer, Berlin Heidelberg (2009)
35.
Zurück zum Zitat Piret, G., Quisquater, J.J.: A differential fault attack technique against spn structures, with application to the aes and khazad. In: Cryptographic Hardware and Embedded Systems—CHES 2003. Lecture Notes in Computer Science, vol. 2779, pp. 77–88. Springer, Berlin Heidelberg (2003) Piret, G., Quisquater, J.J.: A differential fault attack technique against spn structures, with application to the aes and khazad. In: Cryptographic Hardware and Embedded Systems—CHES 2003. Lecture Notes in Computer Science, vol. 2779, pp. 77–88. Springer, Berlin Heidelberg (2003)
38.
Zurück zum Zitat Tunstall, M., Whitnall, C., Oswald, E.: Masking tables - an underestimated security risk. In: Fast Software Encryption—FSE 2013, 425–444 (2013) Tunstall, M., Whitnall, C., Oswald, E.: Masking tables - an underestimated security risk. In: Fast Software Encryption—FSE 2013, 425–444 (2013)
39.
Zurück zum Zitat Tupsamudre, H., Bisht, S., Mukhopadhyay, D.: Destroying fault invariant with randomization - A countermeasure for AES againstDFA. In: Cryptographic Hardware and Embedded Systems—CHES 2014, 93–111 (2014) Tupsamudre, H., Bisht, S., Mukhopadhyay, D.: Destroying fault invariant with randomization - A countermeasure for AES againstDFA. In: Cryptographic Hardware and Embedded Systems—CHES 2014, 93–111 (2014)
Metadaten
Titel
Using linear codes as a fault countermeasure for nonlinear operations: application to AES and formal verification
verfasst von
Sabine Azzi
Bruno Barras
Maria Christofi
David Vigilant
Publikationsdatum
28.10.2016
Verlag
Springer Berlin Heidelberg
Erschienen in
Journal of Cryptographic Engineering / Ausgabe 1/2017
Print ISSN: 2190-8508
Elektronische ISSN: 2190-8516
DOI
https://doi.org/10.1007/s13389-016-0138-1

Weitere Artikel der Ausgabe 1/2017

Journal of Cryptographic Engineering 1/2017 Zur Ausgabe

Special Section on Proofs 2015

Smart security management in secure devices

Special Section on Proofs 2015

Multi-level formal verification

Special Section on Proofs 2015

Trust can be misplaced

Premium Partner