Protecting against statistical ineffective fault attacks

被引:0
|
作者
Daemen J. [1 ]
Dobraunig C. [1 ,2 ]
Eichlseder M. [2 ]
Gross H. [3 ]
Mendel F. [4 ]
Primas R. [2 ]
机构
[1] Radboud University, Nijmegen
[2] Graz University of Technology, Graz
[3] SGS Digital Trust Services GmbH, Graz
[4] Infineon Technologies AG, Neubiberg
基金
奥地利科学基金会; 欧洲研究理事会;
关键词
Fault attack; Fault countermeasures; Implementation security; Masking; SFA; SIFA;
D O I
10.13154/tches.v2020.i3.508-543
中图分类号
学科分类号
摘要
Statistical Ineffective Fault Attacks (SIFA) pose a threat for many practical implementations of symmetric primitives. Countermeasures against both power analysis and fault attacks typically do not prevent straightforward SIFA attacks, which require only very limited knowledge about the concrete implementation. Therefore, the exploration of countermeasures against SIFA that do not rely on protocols or physical protection mechanisms is of great interest. In this paper, we describe different countermeasure strategies against SIFA. First, we introduce an abstraction layer between the algorithmic specification of a cipher and its implementation in hardware or software to study and describe resistance against SIFA. We then show that by basing the masked implementation on permutations as building blocks, we can build circuits that withstand single-fault SIFA and DPA attacks. We show how this approach can be applied to 3-bit, 4-bit, and 5-bit S-boxes and the AES S-box. Additionally, we present a strategy based on fine-grained fault detection suitable for protecting any circuit against SIFA attacks. Although this approach may lead to a higher implementation cost due to the fine-grained detection needed, it can be used to protect arbitrary circuits and can be generalized to cover multi-fault SIFA. For single-fault SIFA protection, our countermeasures only have a small computational overhead compared to a simple combination of masking and duplication. © 2020, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:508 / 543
页数:35
相关论文
共 50 条
  • [21] Protecting Obfuscation against Algebraic Attacks
    Barak, Boaz
    Garg, Sanjam
    Kalai, Yael Tauman
    Paneth, Omer
    Sahai, Amit
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 221 - 238
  • [22] A Recipe for Protecting Against Speculation Attacks
    Sherwood, Timothy
    [J]. COMMUNICATIONS OF THE ACM, 2021, 64 (12) : 104 - 104
  • [23] Protecting users against phishing attacks
    Kirda, Engin
    Kruegel, Christopher
    [J]. COMPUTER JOURNAL, 2006, 49 (05): : 554 - 561
  • [24] Protecting against attacks on open systems
    Dalrymple, PW
    [J]. I&CS-INSTRUMENTATION & CONTROL SYSTEMS, 1998, 71 (02): : 51 - 55
  • [25] Protecting users against phishing attacks
    Kirda, Engin
    Kruegel, Christopher
    [J]. Computer Journal, 2006, 49 (05): : 554 - 561
  • [26] Protecting the Grid Against MAD Attacks
    Soltan, Saleh
    Mittal, Prateek
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2020, 7 (03): : 1310 - 1326
  • [27] Trade-offs in Protecting KECCAK Against Combined Side-Channel and Fault Attacks
    Purnal, Antoon
    Arribas, Victor
    De Meyer, Lauren
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 285 - 302
  • [28] Protecting Location Privacy against Inference Attacks
    Minami, Kazuhiro
    Borisov, Nikita
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 711 - 713
  • [29] Protecting JPEG Images Against Adversarial Attacks
    Prakash, Aaditya
    Moran, Nick
    Garber, Solomon
    DiLillo, Antonella
    Storer, James
    [J]. 2018 DATA COMPRESSION CONFERENCE (DCC 2018), 2018, : 137 - 146
  • [30] Protecting buildings against vehicle bomb attacks
    Longinow, Anatol
    Mniszewski, Kim R.
    [J]. Practice Periodical on Structural Design and Construction, 1996, 1 (01) : 51 - 54