On-line testing for differential fault attacks in cryptographic circuits

Debdeep Mukhopadhyay
{"title":"On-line testing for differential fault attacks in cryptographic circuits","authors":"Debdeep Mukhopadhyay","doi":"10.1109/IOLTS.2013.6604084","DOIUrl":null,"url":null,"abstract":"Faults have been found to be catastrophic for the security of ciphers. Random faults inside a cipher implementation, trigger intentionally or accidentally, can be shown to reduce the key space of ciphers drastically. Even world-wide standard ciphers, like the Advanced Encryption Standard (AES) can be shown to be cryptanalyzed when the faulty ciphertexts are exposed to the outside world. Our recent findings show that fluctuations of the operating conditions of a circuit introduces circuit marginalities, which are manifested as exploitable multiple byte faults. The paper subsequently deals with a natural follow up question, how to test these faults? Can we adopt classical fault tolerance methods to detect these malicious faults? We show that while classical fault tolerance assumes uniform distribution of faults, the fault attacker introduces biased faults. On the other hand, while classical fault tolerance attempts to target all faults, most of the attacks exploit a small subspace of the entire fault space. This hiatus implies the necessity of the emergence of novel on-line methodologies for fault detection. The paper concludes with the requirement of proofs for 100% fault coverage of the attack-exploitable space, vs the simulation based approaches of classical fault tolerance.","PeriodicalId":423175,"journal":{"name":"2013 IEEE 19th International On-Line Testing Symposium (IOLTS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE 19th International On-Line Testing Symposium (IOLTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IOLTS.2013.6604084","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Faults have been found to be catastrophic for the security of ciphers. Random faults inside a cipher implementation, trigger intentionally or accidentally, can be shown to reduce the key space of ciphers drastically. Even world-wide standard ciphers, like the Advanced Encryption Standard (AES) can be shown to be cryptanalyzed when the faulty ciphertexts are exposed to the outside world. Our recent findings show that fluctuations of the operating conditions of a circuit introduces circuit marginalities, which are manifested as exploitable multiple byte faults. The paper subsequently deals with a natural follow up question, how to test these faults? Can we adopt classical fault tolerance methods to detect these malicious faults? We show that while classical fault tolerance assumes uniform distribution of faults, the fault attacker introduces biased faults. On the other hand, while classical fault tolerance attempts to target all faults, most of the attacks exploit a small subspace of the entire fault space. This hiatus implies the necessity of the emergence of novel on-line methodologies for fault detection. The paper concludes with the requirement of proofs for 100% fault coverage of the attack-exploitable space, vs the simulation based approaches of classical fault tolerance.
密码电路差分故障攻击的在线测试
人们发现,错误会对密码的安全性造成灾难性的影响。在密码实现中有意或无意触发的随机故障可以显示为大大减少密码的密钥空间。即使是世界范围内的标准密码,如高级加密标准(AES),当错误的密文暴露给外界时,也可以被加密分析。我们最近的研究结果表明,电路工作条件的波动会引入电路边际性,这表现为可利用的多字节故障。本文随后讨论了一个自然的后续问题,即如何对这些断层进行检测?我们是否可以采用经典的容错方法来检测这些恶意故障?我们证明了经典容错假设错误均匀分布,而错误攻击者引入了偏置错误。另一方面,虽然经典的容错试图针对所有故障,但大多数攻击利用了整个故障空间的一小部分子空间。这种中断意味着出现新的在线故障检测方法的必要性。与传统的基于仿真的容错方法相比,本文提出了攻击可利用空间100%故障覆盖率的证明要求。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信