FRIET: An Authenticated Encryption Scheme with Built-in Fault Detection

被引:26
|
作者
Simon, Thierry [1 ,4 ]
Batina, Lejla [1 ]
Daemen, Joan [1 ]
Grosso, Vincent [1 ,2 ]
Massolino, Pedro Maat Costa [1 ]
Papagiannopoulos, Kostas [1 ,5 ]
Regazzoni, Francesco [3 ]
Samwel, Niels [1 ]
机构
[1] Radboud Univ Nijmegen, Digital Secur Grp, Nijmegen, Netherlands
[2] Univ Lyon, CNRS, Lab Hubert Curien, UMR 5516, St Etienne, France
[3] Univ Lugano, ALaRI, Lugano, Switzerland
[4] STMicroelect Diegem, Diegem, Belgium
[5] NXP Semicond Hamburg, Hamburg, Germany
基金
欧洲研究理事会; 欧盟地平线“2020”;
关键词
Design of cryptographic primitives; Fault injection countermeasures; Side channel attack; Lightweight implementations;
D O I
10.1007/978-3-030-45721-1_21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work we present a duplex-based authenticated encryption scheme FRIET based on a new permutation called FRIET-P. We designed FRIET-P with a novel approach for cryptographic permutations and block ciphers that takes fault-attack resistance into account and that we introduce in this paper. In this method, we build a permutation f(C) to be embedded in a larger one, f. First, we define f as a sequence of steps that all abide a chosen error-correcting code C, i.e., that map C-codewords to C-codewords. Then, we embed f(C) in f by first encoding its input to an element of C, applying f and then decoding back from C. This last step detects a fault when the output of f is not in C. We motivate the design of the permutation we use in FRIET and report on performance in soft- and hardware. We evaluate the fault-detection capabilities of the software and simulated hardware implementations with attacks. Finally, we perform a leakage evaluation. Our code is available at https://github.com/thisimon/Friet.git.
引用
收藏
页码:581 / 611
页数:31
相关论文
共 50 条
  • [1] A Bulk Built-in Sensor for Detection of Fault Attacks
    Bastos, R. Possamai
    Sill Torres, F.
    Dutertre, J. -M.
    Flottes, M. -L.
    Di Natale, G.
    Rouzeyre, B.
    2013 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), 2013, : 51 - 54
  • [2] Reforgeability of Authenticated Encryption Scheme
    Forler, Christian
    List, Eik
    Lucks, Stefan
    Wenzel, Jakob
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 19 - 37
  • [3] A quantum authenticated encryption scheme
    Lü, X
    Ma, Z
    Feng, DG
    2004 7TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS 1-3, 2004, : 2306 - 2309
  • [4] Convertible authenticated encryption scheme
    Wu, TS
    Hsu, CL
    JOURNAL OF SYSTEMS AND SOFTWARE, 2002, 62 (03) : 205 - 209
  • [5] The COLM Authenticated Encryption Scheme
    Andreeva, Elena
    Bogdanov, Andrey
    Datta, Nilanjan
    Luykx, Atul
    Mennink, Bart
    Nandi, Mridul
    Tischhauser, Elmar
    Yasuda, Kan
    JOURNAL OF CRYPTOLOGY, 2024, 37 (02)
  • [6] The FCM Scheme for Authenticated Encryption
    Lei, Xiaomei
    Wu, Zhongdong
    Yong, Jiu
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY (ICMMCT 2017), 2017, 126 : 1123 - 1129
  • [7] The COLM Authenticated Encryption Scheme
    Elena Andreeva
    Andrey Bogdanov
    Nilanjan Datta
    Atul Luykx
    Bart Mennink
    Mridul Nandi
    Elmar Tischhauser
    Kan Yasuda
    Journal of Cryptology, 2024, 37
  • [8] An Improved Authenticated Encryption Scheme
    Li, Fagen
    Deng, Jiang
    Takagi, Tsuyoshi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11) : 2171 - 2172
  • [9] BUILT-IN ARRAY PAYOFF - BETTER FAULT-DETECTION
    CARROLL, M
    HIGH PERFORMANCE SYSTEMS-THE MAGAZINE FOR TECHNOLOGY CHAMPIONS, 1989, 10 (08): : 28 - &
  • [10] BUILT-IN TEST SCHEME FOR DETECTION, CLASSIFICATION AND EVALUATION OF NONLINEARITIES
    Toczek, Wojciech
    Kowalewski, Michal
    METROLOGY AND MEASUREMENT SYSTEMS, 2009, 16 (01) : 47 - 59