skip to main content
10.1145/3457388.3458867acmconferencesArticle/Chapter ViewAbstractPublication PagescfConference Proceedingsconference-collections
research-article

On resilience of security-oriented error detecting architectures against power attacks: a theoretical analysis

Published: 11 May 2021 Publication History

Abstract

It has been previously shown that hardware implementation of fault attack countermeasures based on error-detecting codes (EDCs) can make the circuit more vulnerable to power analysis attacks. We revisit this finding and show that the hypothesis space can grow significantly when a state-of-the-art security-oriented robust EDC is properly crafted. We use the Roth-Karp decomposition as an analytical tool to prove that by a simple re-ordering of the EDC's bits, the number of extra bits needed to formulate the hypotheses becomes so large that power analysis (that tries to exploit additional information from the redundant bits) is rendered infeasible.

References

[1]
N. Admaty, S. Litsyn, and O. Keren. 2012. Puncturing, expurgating and expanding the q-ary BCH based robust codes. In IEEE Convention of Electrical Electronics Engineers in Israel (IEEEI). 1--5.
[2]
Anita Aghaie, Amir Moradi, Shahram Rasoolzadeh, Aein Rezaei Shahmirzadi, Falk Schellenberg, and Tobias Schneider. 2020. Impeccable Circuits. IEEE Trans. Computers 69, 3 (2020), 361--376.
[3]
Abdulaziz Alkhoraidly, Agustin Dominguez-Oviedo, and M. Anwar Hasan. 2012. Fault Attacks on Elliptic Curve Cryptosystems. In Fault Analysis in Cryptography. Springer, 137--155.
[4]
Fadi Busaba, Parag K. Lala, and Alvernon Walker. 1998. On Self-Checking Design of CMOS Circuits for Multiple Faults. VLSI Design 7 (1998), 151--161.
[5]
Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padró, and Daniel Wichs. 2008. Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors. In Advances in Cryptology-EUROCRYPT 2008. Springer, 471--488.
[6]
Julien Doget, Emmanuel Prouff, Matthieu Rivain, and François-Xavier Standaert. 2011. Univariate side channel attacks and leakage modeling. J. Cryptographic Engineering 1, 2 (2011), 123--144.
[7]
Stefan Dziembowski, Krzysztof Pietrzak, and Daniel Wichs. 2009. Non-Malleable Codes. Cryptology ePrint Archive, Report 2009/608. http://eprint.iacr.org/2009/608.
[8]
Nahid Farhady Ghalaty, Bilgiday Yuce, Mostafa M. I. Taha, and Patrick Schaumont. 2014. Differential Fault Intensity Analysis. In FDTC. 49--58.
[9]
Philipp Jovanovic, Martin Kreuzer, and Ilia Polian. 2012. A Fault Attack on the LED Block Cipher. In COSADE (Lecture Notes in Computer Science, Vol. 7275). 120--134.
[10]
Mark G Karpovsky, Konrad J Kulikowski, and Zhen Wang. 2007. Robust error detection in communication and computational channels. In International Workshop on Spectral Methods and Multirate Signal Processing (SMMSP'2007).
[11]
Michael Kasper, Werner Schindler, and Marc Stöttinger. 2010. A stochastic method for security evaluation of cryptographic FPGA implementations. In FPT. IEEE, 146--153.
[12]
Osnat Keren and Mark Karpovsky. 2015. Relations between the entropy of a source and the error masking probability for security-oriented codes. IEEE Transactions on Communications 63, 1 (2015), 206--214.
[13]
Paul Kocher, Joshua Jaffe, Benjamin Jun, and Pankaj Rohatgi. 2011. Introduction to differential power analysis. J Cryptographic Eng 1, 1 (2011), 5--27.
[14]
Juliane Krämer and Mirjam Loiero. 2019. Fault Attacks on UOV and Rainbow. In COSADE (Lecture Notes in Computer Science, Vol. 11421). Springer, 193--214.
[15]
Itamar Levi, Alexander Fish, and Osnat Keren. 2018. Low-Cost Pseudoasynchronous Circuit Design Style With Reduced Exploitable Side Information. IEEE Trans. VLSI Syst. 26, 1 (2018), 82--95.
[16]
Yang Li, Kazuo Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, Junko Takahashi, and Kazuo Ohta. 2010. Fault Sensitivity Analysis. In CHES (Lecture Notes in Computer Science, Vol. 6225). Springer, 320--334.
[17]
Stefan Mangard, Elisabeth Oswald, and Thomas Popp. 2007. Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer.
[18]
Lauren De Meyer, Victor Arribas, Svetla Nikova, Ventzislav Nikov, and Vincent Rijmen. 2019. M&M: Masks and Macs against Physical Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019, 1 (2019), 25--50.
[19]
Yaara Neumeier and Osnat Keren. 2014. Robust generalized punctured cubic codes. IEEE Transactions on Information Theory 60, 5 (2014), 2813--2822.
[20]
Xuan Thuy Ngo, Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, and Zakaria Najm. 2015. Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses. In IEEE International Symposium on Hardware Oriented Security and Trust, HOST Washington, DC, USA, 5--7 May, 2015. 82--87.
[21]
Hila Rabii, Yaara Neumeier, and Osnat Keren. 2018. High rate robust codes with low implementation complexity. IEEE Transactions on Dependable and Secure Computing (2018).
[22]
Hila Rabii, Yaara Neumeier, and Osnat Keren. 2018. Table of best CPC constructions. http://www.eng.biu.ac.il/kereno/ongoing-projects/table-of-best-cpc-codes.
[23]
Francesco Regazzoni, Luca Breveglieri, Paolo Ienne, and Israel Koren. 2012. Interaction Between Fault Attack Countermeasures and the Resistance Against Power Analysis Attacks. In Fault Analysis in Cryptography.
[24]
J. Paul Roth and Richard M. Karp. 1962. Minimization Over Boolean Graphs. IBM Journal of Research and Development 6, 2 (1962), 227--238.
[25]
Fabrizio De Santis, Oscar M. Guillen, Ermin Sakic, and Georg Sigl. 2014. Ciphertext-Only Fault Attacks on PRESENT. In LightSec (Lecture Notes in Computer Science, Vol. 8898). Springer, 85--108.
[26]
Tobias Schneider, Amir Moradi, and Tim GÃijneysu. 2016. ParTI - Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks. In Advances in Cryptology âĂŞ CRYPTO 2016. Annual International Cryptology Conference (CRYPTO-2016), August 14--18, Santa Barbara, CA, United States (Lecture Notes in Computer Science (LNCS), Vol. 9815), Matthew Robshaw and Jonathan Katz (Eds.). Springer, 302--332.
[27]
Bodo Selmke, Johann Heyszl, and Georg Sigl. 2016. Attack on a DFA Protected AES by Simultaneous Laser Fault Injections. In FDTC. 36--46.
[28]
Michael Tunstall, Debdeep Mukhopadhyay, and Subidh Ali. 2011. Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault. In WISTP (Lecture Notes in Computer Science, Vol. 6633). Springer, 224--233.
[29]
Felipe Valencia, Ilia Polian, and Francesco Regazzoni. 2019. Fault Sensitivity Analysis of Lattice-based Post-Quantum Cryptographic Components. In SAMOS. 107--123.
[30]
Zhen Wang and Mark Karpovsky. 2011. Algebraic manipulation detection codes and their applications for design of secure cryptographic devices. In IEEE International On-Line Testing Symposium (IOLTS). IEEE, 234--239.

Cited By

View all
  • (2022)Robust Code Constructions Based on Bent Functions and Spline Wavelet DecompositionMathematics10.3390/math1018330510:18(3305)Online publication date: 12-Sep-2022

Index Terms

  1. On resilience of security-oriented error detecting architectures against power attacks: a theoretical analysis

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CF '21: Proceedings of the 18th ACM International Conference on Computing Frontiers
      May 2021
      254 pages
      ISBN:9781450384049
      DOI:10.1145/3457388
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 11 May 2021

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. error-detecting codes
      2. fault attacks
      3. information leakage
      4. physical attacks
      5. side-channel analysis

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      CF '21
      Sponsor:
      CF '21: Computing Frontiers Conference
      May 11 - 13, 2021
      Virtual Event, Italy

      Acceptance Rates

      Overall Acceptance Rate 273 of 785 submissions, 35%

      Upcoming Conference

      CF '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 25 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Robust Code Constructions Based on Bent Functions and Spline Wavelet DecompositionMathematics10.3390/math1018330510:18(3305)Online publication date: 12-Sep-2022

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media