WDDL is Protected Against Setup Time Violation Attacks

被引:0
|
作者
Selmane, Nidhal [1 ]
Bhasin, Shivam [1 ]
Guilley, Sylvain [1 ]
Graba, Tarik [1 ]
Danger, Jean-Luc [1 ]
机构
[1] TELECOM ParisTech, Inst TELECOM, Dept COMELEC, CNRS LTCI UMR 5141, F-75634 Paris 13, France
关键词
AES; FPGA; Setup violation fault attacks; WDDL; Protection against faults; DIFFERENTIAL FAULT ANALYSIS; SECURITY EVALUATION; LOGIC; AES; COUNTERMEASURES; ERRORS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In order to protect crypto-systems against side channel attacks various countermeasures have been implemented such as dual-rail logic or masking. Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES and DES. Various kind of fault attacks scenarios have been published. However, very few publications available in the public literature detail the practical realization of such attacks. In this paper we present the result of a practical fault attack on AES in WDDL and its comparison with its non-protected equivalent. The practical faults on an FPGA running an AES encryptor are realized by under-powering it and further exploited using Piret's attack. The results show that WDDL is protected against setup violation attacks by construction because a faulty bit is replaced by a null bit in the ciphertext. Therefore, the fault leaks no exploitable information. We also give a theoretical model for the above results. Other references have already studied the potential of fault protection of the resynchronizing gates (delay-insensitive). In this paper, we show that non-resynchronizing gates (hence combinatorial DPL such as WDDL) are natively immune to setup time violation attacks.
引用
收藏
页码:73 / 83
页数:11
相关论文
共 50 条
  • [1] WDDL is Protected Against Setup Time Violation Attacks
    Selmane, Nidhal
    Bhasin, Shivam
    Guilley, Sylvain
    Graba, Tarik
    Danger, Jean-Luc
    2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, : 73 - 83
  • [2] Practical setup time violation attacks on AES
    Selmane, Nidhal
    Guilley, Sylvain
    Danger, Jean-Luc
    EDCC-7: SEVENTH EUROPEAN DEPENDABLE COMPUTING CONFERENCE, PROCEEDINGS, 2008, : 91 - 96
  • [3] Security Evaluation of Different AES Implementations Against Practical Setup Time Violation Attacks in FPGAs
    Bhasin, Shivam
    Selmane, Nidhal
    Guilley, Sylvain
    Danger, Jean-Luc
    2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2009, : 15 - 21
  • [4] Security evaluation of WDDL and SecLib countermeasures against power attacks
    Guilley, Sylvain
    Sauvage, Laurent
    Hoogvorst, Philippe
    Pacalet, Renaud
    Bertoni, Guido Marco
    Chaudhuri, Sumanta
    IEEE TRANSACTIONS ON COMPUTERS, 2008, 57 (11) : 1482 - 1497
  • [5] Security evaluation of application-specific integrated circuits and field programmable gate arrays against setup time violation attacks
    Selmane, N.
    Bhasin, S.
    Guilley, S.
    Danger, J. -L.
    IET INFORMATION SECURITY, 2011, 5 (04) : 181 - 190
  • [6] A Physical Unclonable Function Based on Setup Time Violation
    Hely, David
    Augagneur, Maurin
    Clauzel, Yves
    Dubeuf, Jeremy
    2012 IEEE 30TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2012, : 135 - 138
  • [7] Quantum randomness protected against detection loophole attacks
    Mironowicz, Piotr
    Canas, Gustavo
    Carine, Jaime
    Gomez, Esteban S.
    Barra, Johanna F.
    Cabello, Adan
    Xavier, Guilherme B.
    Lima, Gustavo
    Pawlowski, Marcin
    QUANTUM INFORMATION PROCESSING, 2021, 20 (01)
  • [8] Replacement Attacks Against VM-protected Applications
    Ghosh, Sudeep
    Hiser, Jason
    Davidson, Jack W.
    ACM SIGPLAN NOTICES, 2012, 47 (07) : 203 - 214
  • [9] CRT RSA algorithm protected against fault attacks
    Boscher, Arnaud
    Naciri, Robert
    Prouff, Emmanuel
    INFORMATION SECURITY THEORY AND PRACTICES: SMART CARDS, MOBILE AND UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 2007, 4462 : 229 - +
  • [10] Are Android Apps Being Protected Well Against Attacks?
    Ma, Siqi
    Liu, Yang
    Nepal, Surya
    IEEE WIRELESS COMMUNICATIONS, 2020, 27 (03) : 66 - 71