A comparative cost/security analysis of fault attack countermeasures

被引:0
|
作者
Malkin, Tal G. [1 ]
Standaert, Francois-Xavier
Yungi, Moti
机构
[1] Columbia Univ, Dept Comp Sci, New York, NY 10027 USA
[2] Catholic Univ Louvain, Crypto Grp, B-3000 Louvain, Belgium
关键词
attacks and countermeasures in hardware and software;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Deliberate injection of faults into cryptographic devices is an effective cryptanalysis technique against symmetric and asymmetric encryption algorithms. To protect cryptographic implementations (e.g. of the recent AES which will be our running example) against these attacks, a number of innovative countermeasures have been proposed, usually based on the use of space and time redundancies (e.g. error detection/correction techniques, repeated computations). In this paper, we take the next natural step in engineering studies where alternative methods exist, namely, we take a comparative perspective. For this purpose, we use unified security and efficiency metrics to evaluate various recent protections against fault attacks. The comparative study reveals security weaknesses in some of the countermeasures (e.g. intentional malicious fault injection that are unrealistically modelled). The study also demonstrates that, if fair performance evaluations are performed, many countermeasures are not better than the naive solutions, namely duplication or repetition. We finally suggest certain design improvements for some countermeasures, and further discuss security/efficiency tradeoffs.
引用
收藏
页码:159 / 172
页数:14
相关论文
共 50 条
  • [1] Avatar: Reinforcing Fault Attack Countermeasures in EDA with Fault Transformations
    Roy, Prithwish Basu
    Patanjali, S. L. P. S. K.
    Rebeiro, Chester
    27TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC 2022, 2022, : 417 - 422
  • [2] Fault attack and countermeasures on pairing based cryptography
    Ghosh, Santosh
    Mukhopadhyay, Debdeep
    Chowdhury, Dipanwita Roy
    International Journal of Network Security, 2011, 12 (01) : 21 - 28
  • [3] Exploring security countermeasures along the attack sequence
    Sakuraba, Taketoshi
    Domyo, Seiichi
    Chou, Bin-Hui
    Sakurai, Kuichi
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 427 - 432
  • [4] A Comparative Analysis of the Cost of Social Security
    不详
    INTERNATIONAL LABOUR REVIEW, 1953, 67 (03) : 292 - 303
  • [5] Analysis of Factors Affecting Network Security and Countermeasures Based on Network Attack Roadmap
    Dong, Guoliang
    2022 INTERNATIONAL CONFERENCE ON INDUSTRIAL IOT, BIG DATA AND SUPPLY CHAIN, IIOTBDSC, 2022, : 195 - 198
  • [6] Security Analysis of the Masking-Shuffling based Side Channel Attack Countermeasures
    Cho, Jong-Won
    Han, Dong-Guk
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (04): : 207 - 213
  • [7] Quantitative security and safety analysis with attack-fault trees
    Kumar, Rajesh
    Stoelinga, Marielle
    2017 IEEE 18TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE 2017), 2017, : 25 - 32
  • [8] Synthesis of Fault-Attack Countermeasures for Cryptographic Circuits
    Eldib, Hassan
    Wu, Meng
    Wang, Chao
    COMPUTER AIDED VERIFICATION: 28TH INTERNATIONAL CONFERENCE, CAV 2016, PT II, 2016, 9780 : 343 - 363
  • [9] ALAFA: Automatic Leakage Assessment for Fault Attack Countermeasures
    Saha, Sayandeep
    Kumar, S. Nishok
    Patranabis, Sikhar
    Mukhopadhyay, Debdeep
    Dasgupta, Pallab
    PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
  • [10] On the Need of Randomness in Fault Attack Countermeasures - Application to AES
    Lomne, Victor
    Roche, Thomas
    Thillard, Adrian
    2012 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC), 2012, : 85 - 94