WDDL is Protected Against Setup Time Violation Attacks

被引:0
|
作者
Selmane, Nidhal [1 ]
Bhasin, Shivam [1 ]
Guilley, Sylvain [1 ]
Graba, Tarik [1 ]
Danger, Jean-Luc [1 ]
机构
[1] TELECOM ParisTech, Inst TELECOM, Dept COMELEC, CNRS LTCI UMR 5141, F-75634 Paris 13, France
来源
PROCEEDINGS OF THE 2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009) | 2009年
关键词
AES; FPGA; Setup violation fault attacks; WDDL; Protection against faults; DIFFERENTIAL FAULT ANALYSIS; SECURITY EVALUATION; LOGIC; AES; COUNTERMEASURES; ERRORS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In order to protect crypto-systems against side channel attacks various countermeasures have been implemented such as dual-rail logic or masking. Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES and DES. Various kind of fault attacks scenarios have been published. However, very few publications available in the public literature detail the practical realization of such attacks. In this paper we present the result of a practical fault attack on AES in WDDL and its comparison with its non-protected equivalent. The practical faults on an FPGA running an AES encryptor are realized by under-powering it and further exploited using Piret's attack. The results show that WDDL is protected against setup violation attacks by construction because a faulty bit is replaced by a null bit in the ciphertext. Therefore, the fault leaks no exploitable information. We also give a theoretical model for the above results. Other references have already studied the potential of fault protection of the resynchronizing gates (delay-insensitive). In this paper, we show that non-resynchronizing gates (hence combinatorial DPL such as WDDL) are natively immune to setup time violation attacks.
引用
收藏
页码:73 / 83
页数:11
相关论文
共 50 条
  • [21] Feasible Time Delay Attacks Against the Precision Time Protocol
    Finkenzeller, Andreas
    Wakim, Thomas
    Hamad, Mohammad
    Steinhorst, Sebastian
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 3375 - 3380
  • [22] Skew-Aware Functional Timing Analysis Against Setup Violation For Post-Layout Validation
    Jhao, Pin-Ru
    Wu, Denny C-Y
    Wen, Charles H-P
    2018 IEEE INTERNATIONAL TEST CONFERENCE IN ASIA (ITC-ASIA 2018), 2018, : 67 - 72
  • [23] Design and Setup of Power Analysis Attacks
    Safta, Mariana
    Svasta, Paul
    Dima, Mihai
    Marghescu, Andrei
    Costiuc, Mihai-Narcis
    2016 IEEE 22ND INTERNATIONAL SYMPOSIUM FOR DESIGN AND TECHNOLOGY AND ELECTRONIC PACKAGING (SIITME), 2016, : 110 - 113
  • [24] Toward a Protected Cloud Against Side Channel Attacks: A Game-Theoretic Framework
    Anwar, Ahmed H.
    Atia, George
    Guirguis, Mina
    2018 56TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2018, : 78 - 83
  • [25] Tail Time Defense Against Website Fingerprinting Attacks
    Liang, Jingyuan
    Yu, Chansu
    Suh, Kyoungwon
    Han, Hyoil
    IEEE ACCESS, 2022, 10 : 18516 - 18525
  • [26] Stealthy Attacks against Robotic Vehicles Protected by Control-based Intrusion Detection Techniques
    Dash, Pritam
    Karimibiuki, Mehdi
    Pattabiraman, Karthik
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2021, 2 (01):
  • [27] Out of Control: Stealthy Attacks Against Robotic Vehicles Protected by Control-based Techniques
    Dash, Pritam
    Karimibiuki, Mehdi
    Pattabiraman, Karthik
    35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA), 2019, : 660 - 672
  • [28] Evaluation of Resistance of ECC Designs protected by Different Randomization Countermeasures against Horizontal DPA Attacks
    Kabin, Ievgen
    Dyka, Zoya
    Kreiser, Dan
    Langendoerfer, Peter
    2017 IEEE EAST-WEST DESIGN & TEST SYMPOSIUM (EWDTS), 2017,
  • [29] Prediction of Attacks Against Honeynet Based on Time Series Modeling
    Sokol, Pavol
    Gajdos, Andrej
    APPLIED COMPUTATIONAL INTELLIGENCE AND MATHEMATICAL METHODS: COMPUTATIONAL METHODS IN SYSTEMS AND SOFTWARE 2017, VOL. 2, 2018, 662 : 360 - 371
  • [30] Detection and Mitigation of Spoofing Attacks Against Time Synchronization and Positioning
    Lee, Junhwan
    Schmidt, Erick
    Gatsis, Nikolaos
    Akopian, David
    IEEE ACCESS, 2023, 11 : 138986 - 139003