FRIET: An Authenticated Encryption Scheme with Built-in Fault Detection

被引:26
|
作者
Simon, Thierry [1 ,4 ]
Batina, Lejla [1 ]
Daemen, Joan [1 ]
Grosso, Vincent [1 ,2 ]
Massolino, Pedro Maat Costa [1 ]
Papagiannopoulos, Kostas [1 ,5 ]
Regazzoni, Francesco [3 ]
Samwel, Niels [1 ]
机构
[1] Radboud Univ Nijmegen, Digital Secur Grp, Nijmegen, Netherlands
[2] Univ Lyon, CNRS, Lab Hubert Curien, UMR 5516, St Etienne, France
[3] Univ Lugano, ALaRI, Lugano, Switzerland
[4] STMicroelect Diegem, Diegem, Belgium
[5] NXP Semicond Hamburg, Hamburg, Germany
基金
欧洲研究理事会; 欧盟地平线“2020”;
关键词
Design of cryptographic primitives; Fault injection countermeasures; Side channel attack; Lightweight implementations;
D O I
10.1007/978-3-030-45721-1_21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work we present a duplex-based authenticated encryption scheme FRIET based on a new permutation called FRIET-P. We designed FRIET-P with a novel approach for cryptographic permutations and block ciphers that takes fault-attack resistance into account and that we introduce in this paper. In this method, we build a permutation f(C) to be embedded in a larger one, f. First, we define f as a sequence of steps that all abide a chosen error-correcting code C, i.e., that map C-codewords to C-codewords. Then, we embed f(C) in f by first encoding its input to an element of C, applying f and then decoding back from C. This last step detects a fault when the output of f is not in C. We motivate the design of the permutation we use in FRIET and report on performance in soft- and hardware. We evaluate the fault-detection capabilities of the software and simulated hardware implementations with attacks. Finally, we perform a leakage evaluation. Our code is available at https://github.com/thisimon/Friet.git.
引用
收藏
页码:581 / 611
页数:31
相关论文
共 50 条
  • [21] Authenticated encryption scheme based on quadratic residue
    Chen, KF
    ELECTRONICS LETTERS, 1998, 34 (22) : 2115 - 2116
  • [22] A secure authenticated encryption scheme and its extension
    Zhang, Jianhong
    Cheng, Ji
    PROCEEDINGS OF 2007 INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS, 2007, : 74 - 78
  • [23] AN ENHANCED THRESHOLD AUTHENTICATED ENCRYPTION SCHEME WITH CONVERTIBILITY
    Chen, Tzung-Her
    Li, Ct-Lin
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (11): : 6177 - 6185
  • [24] Dynamic Threshold Proxy Authenticated Encryption Scheme
    Song Yubo
    Hu Aiqun
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4637 - 4640
  • [25] Revisiting the Security of COMET Authenticated Encryption Scheme
    Gueron, Shay
    Jha, Ashwin
    Nandi, Mridul
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 3 - 25
  • [26] Convertible multi-authenticated encryption scheme
    Wu, Tzong-Sun
    Hsu, Chien-Lung
    Tsai, Kuo-Yu
    Lin, Han-Yu
    Wu, Tzong-Chen
    INFORMATION SCIENCES, 2008, 178 (01) : 256 - 263
  • [27] A SUPERVISING AUTHENTICATED ENCRYPTION SCHEME FOR MULTILEVEL SECURITY
    Hsu, Chien-Lung
    Chang, Lang-Peng
    Wu, Tzong-Chen
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (03): : 1087 - 1095
  • [28] A novel authenticated encryption scheme and its extension
    Zhang, Jianhong
    Zhao, Xubing
    Ji, Cheng
    INFORMATION SCIENCES, 2015, 317 : 196 - 201
  • [29] Robust authenticated encryption scheme with message linkages
    Yoon, EJ
    Yoo, KY
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 4, PROCEEDINGS, 2005, 3684 : 281 - 288
  • [30] An Efficient Scheme of Authenticated Encryption with Associated Data
    Zhang, Shaolan
    Xing, Guobo
    Yang, Yixian
    2010 CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-5, 2010, : 4217 - +