Skip to main content

Fault Detection in PP-2 Symmetric Block Cipher

  • Chapter
  • First Online:
Soft Computing in Computer and Information Science

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 342))

  • 616 Accesses

Abstract

Concurrent Error Detection (CED) techniques based on hardware or time redundancy are widely used to enhance system dependability and to detect fault injection attacks. In this paper, we present two approaches to countermeasure against fault injections into a symmetric block cipher PP-2. We proposed the hardware redundancy CED technique based on parity checks and time redundancy technique based on an inverse relationship between encryption and decryption at the round level of PP-2. Simulation results for single and multiple as well as transient and permanent faults are presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Boneh, D., Demillo, R., Lipton, R.: On the importance of checking cryptographic protocols for faults. In: Proceedings of Eurocrypt, vol. 1233, pp. 37–51. Springer (1997)

    Google Scholar 

  2. Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The Sorcerer’s apprentice guide to fault attacks. Proc. IEEE 94, 370–382 (2006)

    Article  Google Scholar 

  3. Idzikowska, E., Bucholc, K.: Error detection schemes for CED in block ciphers. In: Proceedings of the 5th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing EUC, Shanghai, pp. 22–27 (2008)

    Google Scholar 

  4. Idzikowska, E.: CED for involutional functions of PP-1 cipher. In: Proceedings of the 5th International Conference on Future Information Technology, Busan (2010)

    Google Scholar 

  5. Bucholc, K., Chmiel, K., Stokłosa, J.: Koncepcja szyfru blokowego PP-2. Report No. 606 (2010)

    Google Scholar 

  6. Piret, G., Quisquater, J.-J.: A differential fault attack technique against SPN structures, with applications to the AES and Khazad. In: Proceedings of CHES 2003. Lecture Notes in Computer Science, vol. 2779, pp. 77–88 (2003)

    Google Scholar 

Download references

Acknowledgments

This research was supported by 04/45/DS PB/0122.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ewa Idzikowska .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Idzikowska, E. (2015). Fault Detection in PP-2 Symmetric Block Cipher. In: Wiliński, A., Fray, I., Pejaś, J. (eds) Soft Computing in Computer and Information Science. Advances in Intelligent Systems and Computing, vol 342. Springer, Cham. https://doi.org/10.1007/978-3-319-15147-2_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-15147-2_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-15146-5

  • Online ISBN: 978-3-319-15147-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics