skip to main content
10.1145/3316781.3317763acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
research-article

ALAFA: Automatic Leakage Assessment for Fault Attack Countermeasures

Authors Info & Claims
Published:02 June 2019Publication History

ABSTRACT

Assessment of the security provided by a fault attack countermeasure is challenging, given that a protected cipher may leak the key if the countermeasure is not designed correctly. This paper proposes, for the first time, a statistical framework to detect information leakage in fault attack countermeasures. Based on the concept of non-interference, we formalize the leakage for fault attacks and provide a t-test based methodology for leakage assessment. One major strength of the proposed framework is that leakage can be detected without the complete knowledge of the countermeasure algorithm, solely by observing the faulty ciphertext distributions. Experimental evaluation over a representative set of countermeasures establishes the efficacy of the proposed methodology.

References

  1. G. Barthe, S. Belaïd, F. Dupressoir, P. Fouque, B. Grégoire, and P. Strub. 2015. Verified proofs of higher-order masking. In EuroCrypt'15. Springer, 457--485.Google ScholarGoogle Scholar
  2. E. Biham and A. Shamir. 1997. Differential fault analysis of secret key cryptosystems. In CRYPTO'97. Springer, Santa Barbara, USA, 513--525. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. Clark, S. Hunt, and P. Malacaria. 2004. Quantified interference: Information theory and information flow. In WITS'04.Google ScholarGoogle Scholar
  4. S. Ghosh, D. Saha, A. Sengupta, and D. Roychowdhury. 2015. Preventing fault attacks using fault randomization with a case study on AES. In ACISP'15. Springer, 343--355.Google ScholarGoogle Scholar
  5. B. Gierlichs, J. Schmidt, and M. Tunstall. 2012. Infective computation and dummy rounds: fault protection for block ciphers without check-before-output. In Latin-Crypt'12. Springer, 305--321. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Xiaofei Guo, Debdeep Mukhopadhyay, Chenglu Jin, and Ramesh Karri. 2015. Security analysis of concurrent error detection against differential fault analysis. Journal of Cryptographic Engineering 5, 3 (Sep 2015), 153--169.Google ScholarGoogle ScholarCross RefCross Ref
  7. V. Lomné, T. Roche, and A. Thillard. 2012. On the need of randomness in fault attack countermeasures-application to AES. In FDTC'12. IEEE, 85--94. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Patranabis, A. Chakraborty, and D. Mukhopadhyay. 2017. Fault tolerant infective countermeasure for AES. Journal of Hardware and Systems Security 1, 1 (2017), 3--17.Google ScholarGoogle ScholarCross RefCross Ref
  9. K. Sakiyama and et. al. 2012. Information-theoretic approach to optimal differential fault analysis. IEEE Trans. Information Forensics and Security 7, 1 (2012), 109--120. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. T. Schneider and A. Moradi. 2015. Leakage assessment methodology. In CHES'15. Springer, 495--513.Google ScholarGoogle Scholar
  11. M. Tunstall, D. Mukhopadhyay, and S. Ali. 2011. Differential fault analysis of the advanced encryption standard using a single fault. In IFIP, WISTP'11. Springer, Crete, Greece, 224--233. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. H. Tupsamudre, S. Bisht, and D. Mukhopadhyay. 2014. Destroying fault invariant with randomization. In CHES'14. Springer, 93--111. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    DAC '19: Proceedings of the 56th Annual Design Automation Conference 2019
    June 2019
    1378 pages
    ISBN:9781450367257
    DOI:10.1145/3316781

    Copyright © 2019 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 2 June 2019

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate1,770of5,499submissions,32%

    Upcoming Conference

    DAC '24
    61st ACM/IEEE Design Automation Conference
    June 23 - 27, 2024
    San Francisco , CA , USA

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader