Avatar: Reinforcing Fault Attack Countermeasures in EDA with Fault Transformations

被引:0
|
作者
Roy, Prithwish Basu [1 ]
Patanjali, S. L. P. S. K. [2 ]
Rebeiro, Chester [1 ]
机构
[1] Indian Inst Technol Madras, Madras, Tamil Nadu, India
[2] Univ Florida, Gainesville, FL USA
来源
27TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC 2022 | 2022年
关键词
Fault injection attacks; Gate Reconfiguration; EDA Security; CONCURRENT ERROR-DETECTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptography hardware are highly vulnerable to a class of side-channel attacks known as Differential Fault Analysis (DFA). These attacks exploit fault induced errors to compromise secret keys from ciphers within a few seconds. A bias in the error probabilities strengthens the attack considerably. It abets in bypassing countermeasures and is also the basis of powerful attack variants like the Differential Fault Intensity Analysis (DFIA) and Statistical Ineffective Fault Analysis (SIFA). In this paper, we make two significant contributions. First, we identify the correlation between fault induced errors and gate-level parameters like the threshold voltage, gate size, and V-DD. We show how these parameters can influence the bias in the error probabilities. Then, we propose an algorithm, called Avatar, that carefully tunes gate-level parameters to strengthen the redundancy countermeasures against DFA, DFIA, and SIFA attacks with no additional logic needed. The central idea of Avatar is to reconfigure gates in the redundant circuits so that each circuit has a unique behavior to faults, making fault detection much more efficient. In AES for instance, fault attack resistance improves by 40% for DFA and DFIA, and 99% in the case of SIFA. Avatar incurs negligible area overheads and can be quickly adopted in any cipher design. It can be incorporated in commercial EDA flows and provides users with tunable knobs to trade-off performance and power consumption, for fault attack security.
引用
收藏
页码:417 / 422
页数:6
相关论文
共 50 条
  • [41] Fault based attack of the Rijndael cryptosystem
    Mukhopadhyay, Debdeep
    RoyChowdhury, Dipanwita
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (02): : 267 - 290
  • [42] The Differential Fault Attack of PRESENT Cipher
    Chen W.-J.
    Zhao S.-Y.
    Zou R.-J.
    Zhang X.-N.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2019, 48 (06): : 865 - 869
  • [43] A Differential Fault Attack on MICKEY 2.0
    Banik, Subhadeep
    Maitra, Subhamoy
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2013, 2013, 8086 : 215 - 232
  • [44] Integral Based Fault Attack on LBlock
    Chen, Hua
    Fan, Limin
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 227 - 240
  • [45] Fault Attack on the Balanced Shrinking Generator
    GAO Juntao~ 1
    2.Department of Applied Mathematics
    WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1773 - 1776
  • [46] Electric Probes for Fault Injection Attack
    Sauvage, Laurent
    2013 ASIA-PACIFIC SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC), 2013,
  • [47] Fault Attack on AKCN-MLWE
    Yang B.-L.
    Zhang F.
    Zhao Y.-L.
    Zhang W.-M.
    Zhao X.-J.
    Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (07): : 1396 - 1408
  • [48] Differential Fault Attack on ASCON Cipher
    Jana, Amit
    PROGRESS IN CRYPTOLOGY-INDOCRYPT 2024, PT II, 2025, 15496 : 53 - 72
  • [49] Theoretical analysis of persistent fault attack
    Zhang, Fan
    Xu, Guorui
    Yang, Bolin
    Liang, Ziyuan
    Ren, Kui
    SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (03)
  • [50] Theoretical analysis of persistent fault attack
    Fan ZHANG
    Guorui XU
    Bolin YANG
    Ziyuan LIANG
    Kui REN
    ScienceChina(InformationSciences), 2020, 63 (03) : 234 - 239