Avatar: Reinforcing Fault Attack Countermeasures in EDA with Fault Transformations

被引:0
|
作者
Roy, Prithwish Basu [1 ]
Patanjali, S. L. P. S. K. [2 ]
Rebeiro, Chester [1 ]
机构
[1] Indian Inst Technol Madras, Madras, Tamil Nadu, India
[2] Univ Florida, Gainesville, FL USA
关键词
Fault injection attacks; Gate Reconfiguration; EDA Security; CONCURRENT ERROR-DETECTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptography hardware are highly vulnerable to a class of side-channel attacks known as Differential Fault Analysis (DFA). These attacks exploit fault induced errors to compromise secret keys from ciphers within a few seconds. A bias in the error probabilities strengthens the attack considerably. It abets in bypassing countermeasures and is also the basis of powerful attack variants like the Differential Fault Intensity Analysis (DFIA) and Statistical Ineffective Fault Analysis (SIFA). In this paper, we make two significant contributions. First, we identify the correlation between fault induced errors and gate-level parameters like the threshold voltage, gate size, and V-DD. We show how these parameters can influence the bias in the error probabilities. Then, we propose an algorithm, called Avatar, that carefully tunes gate-level parameters to strengthen the redundancy countermeasures against DFA, DFIA, and SIFA attacks with no additional logic needed. The central idea of Avatar is to reconfigure gates in the redundant circuits so that each circuit has a unique behavior to faults, making fault detection much more efficient. In AES for instance, fault attack resistance improves by 40% for DFA and DFIA, and 99% in the case of SIFA. Avatar incurs negligible area overheads and can be quickly adopted in any cipher design. It can be incorporated in commercial EDA flows and provides users with tunable knobs to trade-off performance and power consumption, for fault attack security.
引用
收藏
页码:417 / 422
页数:6
相关论文
共 50 条
  • [21] A Differential Fault Attack on Plantlet
    Maitra, Subhamoy
    Siddhanti, Akhilesh
    Sarkar, Santanu
    IEEE TRANSACTIONS ON COMPUTERS, 2017, 66 (10) : 1804 - 1808
  • [22] Fault Attack on SKINNY Cipher
    Navid Vafaei
    Sayandeep Saha
    Nasour Bagheri
    Debdeep Mukhopadhyay
    Journal of Hardware and Systems Security, 2020, 4 (4) : 277 - 296
  • [23] Differential Fault Attack on Camellia
    Zhou Yongbin
    Wu Wenling
    Xu Nannan
    Feng Dengguo
    CHINESE JOURNAL OF ELECTRONICS, 2009, 18 (01): : 13 - 19
  • [24] Differential Fault Attack on GIFT
    XIE Min
    TIAN Feng
    LI Jiaqi
    Chinese Journal of Electronics, 2021, 30 (04) : 669 - 675
  • [25] Differential fault attack on FeW
    Xie M.
    Li J.
    Tian F.
    Tongxin Xuebao/Journal on Communications, 2020, 41 (04): : 143 - 149
  • [26] Differential Fault Attack on GIFT
    XIE, Min
    TIAN, Feng
    Li, Jiaqi
    CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (04) : 669 - 675
  • [27] Correlation fault attack on AES
    Wang X.
    Hu W.
    Tan J.
    Zhu J.
    Tang S.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (04): : 192 - 199and208
  • [28] Differential Fault Attack on Rocca
    Anand, Ravi
    Isobe, Takanori
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2021, 2022, 13218 : 283 - 295
  • [29] JTAG Fault Injection Attack
    Majeric, F.
    Gonzalvo, B.
    Bossuet, L.
    IEEE EMBEDDED SYSTEMS LETTERS, 2018, 10 (03) : 65 - 68
  • [30] Persistent fault attack in practice
    Zhang F.
    Zhang Y.
    Jiang H.
    Zhu X.
    Bhasin S.
    Zhao X.
    Liu Z.
    Gu D.
    Ren K.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (02): : 172 - 195