WDDL is Protected Against Setup Time Violation Attacks

被引:0
|
作者
Selmane, Nidhal [1 ]
Bhasin, Shivam [1 ]
Guilley, Sylvain [1 ]
Graba, Tarik [1 ]
Danger, Jean-Luc [1 ]
机构
[1] TELECOM ParisTech, Inst TELECOM, Dept COMELEC, CNRS LTCI UMR 5141, F-75634 Paris 13, France
来源
PROCEEDINGS OF THE 2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009) | 2009年
关键词
AES; FPGA; Setup violation fault attacks; WDDL; Protection against faults; DIFFERENTIAL FAULT ANALYSIS; SECURITY EVALUATION; LOGIC; AES; COUNTERMEASURES; ERRORS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In order to protect crypto-systems against side channel attacks various countermeasures have been implemented such as dual-rail logic or masking. Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES and DES. Various kind of fault attacks scenarios have been published. However, very few publications available in the public literature detail the practical realization of such attacks. In this paper we present the result of a practical fault attack on AES in WDDL and its comparison with its non-protected equivalent. The practical faults on an FPGA running an AES encryptor are realized by under-powering it and further exploited using Piret's attack. The results show that WDDL is protected against setup violation attacks by construction because a faulty bit is replaced by a null bit in the ciphertext. Therefore, the fault leaks no exploitable information. We also give a theoretical model for the above results. Other references have already studied the potential of fault protection of the resynchronizing gates (delay-insensitive). In this paper, we show that non-resynchronizing gates (hence combinatorial DPL such as WDDL) are natively immune to setup time violation attacks.
引用
收藏
页码:73 / 83
页数:11
相关论文
共 50 条
  • [31] JITSafe: a framework against Just-in-time spraying attacks
    Chen, Ping
    Wu, Rui
    Mao, Bing
    IET INFORMATION SECURITY, 2013, 7 (04) : 283 - 292
  • [32] Hardening Systems Against Data Corruption Attacks at Design Time
    Breton, John
    Jaskolka, Jason
    Yee, George O. M.
    FOUNDATIONS AND PRACTICE OF SECURITY, PT I, FPS 2023, 2024, 14551 : 391 - 407
  • [33] ATTACKS AGAINST
    SWANBERG, AV
    JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION, 1954, 156 (10): : 1009 - 1009
  • [34] Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary Attacks
    Wang, Yongge
    INFORMATION SECURITY AND PRIVACY RESEARCH, 2012, 376 : 489 - 500
  • [35] PT-Guard: Integrity-Protected Page Tables to Defend Against Breakthrough Rowhammer Attacks
    Saxena, Anish
    Saileshwar, Gururaj
    Juffinger, Jonas
    Kogler, Andreas
    Gruss, Daniel
    Qureshi, Moinuddin
    2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, DSN, 2023, : 95 - 108
  • [36] Test-Time Poisoning Attacks Against Test-Time Adaptation Models
    Cong, Tianshuo
    He, Xinlei
    Shen, Yun
    Zhang, Yang
    45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, 2024, : 1306 - 1324
  • [37] Test Time Augmentation as a Defense Against Adversarial Attacks on Online Handwriting
    Yamashita, Yoh
    Iwana, Brian Kenji
    DOCUMENT ANALYSIS AND RECOGNITION-ICDAR 2024, PT II, 2024, 14805 : 156 - 172
  • [38] Improved resistance against time desynchronization attacks in multibit audio watermarking
    Cvejic, Nedeljko
    Seppanen, Tapio
    2007 9TH INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND ITS APPLICATIONS, VOLS 1-3, 2007, : 548 - +
  • [39] One-time password authentication protocol against theft attacks
    Tsuji, T
    Shimizu, A
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (03) : 523 - 529
  • [40] Continuous media fingerprinting against time-varying collusion attacks
    Cha, Byung-Ho
    Choi, Sang-Il
    INFORMATION SCIENCES, 2015, 298 : 66 - 79