Side-Channel Attacks on Triple Modular Redundancy Schemes

被引:0
|
作者
Almeida, Felipe [1 ]
Aksoy, Levent [1 ]
Raik, Jaan [1 ]
Pagliarini, Samuel [1 ]
机构
[1] Tallinn Univ Technol, Dept Comp Syst, Tallinn, Estonia
关键词
triple modular redundancy; side-channel attacks; advanced encryption standard;
D O I
10.1109/ATS52891.2021.00026
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Triple Modular Redundancy (TMR) is a well-known fault tolerance technique for avoiding errors in the Integrated Circuits (ICs) and it has been used in a wide range of applications. The TMR technique employs three instances of circuits realizing concurrently the same functionality whose outputs are compared through a majority voter. On the other hand, SideChannel Attacks (SCAs) are powerful techniques to extract secret information from ICs based on the data collected from security critical operations. Over the years, the interplay between security and reliability is poorly studied. In this paper, we explore the performance of SCAs on the well-known Advanced Encryption Standard (AES) and its different realizations using the TMR technique. In this work, three implementations of the AES design under the TMR scheme are used and an SCA, which can collect power dissipation data from the physical netlist through simulations, is developed. The experimental results show that the TMR technique can increase the computation time of SCAs and more importantly, the use of functionally equivalent, but physically and structurally different instances in the TMR scheme can make it impossible for SCAs to discover the secret key.
引用
收藏
页码:79 / 84
页数:6
相关论文
共 50 条
  • [1] Thwarting Side-Channel Attacks
    Edwards, Chris
    [J]. COMMUNICATIONS OF THE ACM, 2020, 63 (10) : 13 - 14
  • [2] Side-channel attacks on symmetric encryption schemes: The case for authenticated encryption
    Black, J
    Urtubia, H
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 11TH USENIX SECURITY SYMPOSIUM, 2002, : 327 - 338
  • [3] Combined Side-Channel Attacks
    Elaabid, M. Abdelaziz
    Meynard, Olivier
    Guilley, Sylvain
    Danger, Jean-Luc
    [J]. INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 175 - 190
  • [4] On the Detection of Side-Channel Attacks
    Vateva-Gurova, Tsvetoslava
    Suri, Neeraj
    [J]. 2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 185 - 186
  • [5] Algebraic Side-Channel Attacks
    Renauld, Mathieu
    Standaert, Francois-Xavier
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 393 - 410
  • [6] Side-channel attacks on smartcards
    NGS Software
    [J]. Netw. Secur., 2006, 12 (18-20):
  • [7] Introduction to Side-Channel Attacks and Fault Attacks
    Li, Yang
    Chen, Mengting
    Wang, Jian
    [J]. 2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC), 2016, : 573 - 575
  • [8] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    [J]. 39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [9] A study on analyzing side-channel resistant encoding schemes with respect to fault attacks
    Breier J.
    Jap D.
    Bhasin S.
    [J]. Breier, Jakub (jbreier@ntu.edu.sg), 1600, Springer Verlag (07): : 311 - 320
  • [10] Custom Instruction Support for Modular Defense Against Side-Channel and Fault Attacks
    Kiaei, Pantea
    Mercadier, Darius
    Dagand, Pierre-Evariste
    Heydemann, Karine
    Schaumont, Patrick
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 221 - 253