WDDL is Protected Against Setup Time Violation Attacks

被引:0
|
作者
Selmane, Nidhal [1 ]
Bhasin, Shivam [1 ]
Guilley, Sylvain [1 ]
Graba, Tarik [1 ]
Danger, Jean-Luc [1 ]
机构
[1] TELECOM ParisTech, Inst TELECOM, Dept COMELEC, CNRS LTCI UMR 5141, F-75634 Paris 13, France
来源
PROCEEDINGS OF THE 2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009) | 2009年
关键词
AES; FPGA; Setup violation fault attacks; WDDL; Protection against faults; DIFFERENTIAL FAULT ANALYSIS; SECURITY EVALUATION; LOGIC; AES; COUNTERMEASURES; ERRORS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In order to protect crypto-systems against side channel attacks various countermeasures have been implemented such as dual-rail logic or masking. Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES and DES. Various kind of fault attacks scenarios have been published. However, very few publications available in the public literature detail the practical realization of such attacks. In this paper we present the result of a practical fault attack on AES in WDDL and its comparison with its non-protected equivalent. The practical faults on an FPGA running an AES encryptor are realized by under-powering it and further exploited using Piret's attack. The results show that WDDL is protected against setup violation attacks by construction because a faulty bit is replaced by a null bit in the ciphertext. Therefore, the fault leaks no exploitable information. We also give a theoretical model for the above results. Other references have already studied the potential of fault protection of the resynchronizing gates (delay-insensitive). In this paper, we show that non-resynchronizing gates (hence combinatorial DPL such as WDDL) are natively immune to setup time violation attacks.
引用
收藏
页码:73 / 83
页数:11
相关论文
共 50 条
  • [41] Anomaly detection against mimicry attacks based on time decay modelling
    Muramatsu, Akinori
    Aritsugi, Masayoshi
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2024, 15 (05)
  • [42] Defending Against Adversarial Attacks on Time-series with Selective Classification
    Kuehne, Joana
    Guehmann, Clemens
    2022 PROGNOSTICS AND HEALTH MANAGEMENT CONFERENCE, PHM-LONDON 2022, 2022, : 169 - 175
  • [43] Transparent run-time defense against stack smashing attacks
    Baratloo, A
    Singh, N
    Tsai, T
    USENIX ASSOCIATION PROCEEDINGS OF THE 2000 USENIX ANNUAL TECHNICAL CONFERENCE, 2000, : 251 - 262
  • [44] Training-Time Attacks against k-Nearest Neighbors
    Vartanian, Ara
    Rosenbaum, Will
    Alfeld, Scott
    THIRTY-SEVENTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 37 NO 8, 2023, : 10053 - 10060
  • [45] Constant Time Encryption as a Countermeasure against Remote Cache Timing Attacks
    Jayasinghe, Darshana
    Ragel, Roshan
    Elkaduwe, Dhammika
    2012 IEEE 6TH INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION FOR SUSTAINABILITY (ICIAFS2012), 2012, : 129 - 134
  • [46] ADDRESS COLLISION ATTACKS ON ECSM PROTECTED BY ADPA
    Tang Hong
    Ju Tailiang
    Li Yao
    2020 17TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2020, : 235 - 239
  • [47] Time Reversal Violation
    Quinn, Helen R.
    DISCRETE 08: SYMPOSIUM ON PROSPECTS IN THE PHYSICS OF DISCRETE SYMMETRIES, 2009, 171
  • [48] Less setup time
    不详
    MANUFACTURING ENGINEERING, 1999, 123 (03): : 36 - 36
  • [49] Protected time
    Smythe, WR
    SURGERY, 2004, 135 (02) : 232 - 234
  • [50] An analogy of the quantum hall conductivity in a Lorentz-symmetry violation setup
    Ribeiro, L. R.
    Furtado, C.
    Passos, E.
    JOURNAL OF PHYSICS G-NUCLEAR AND PARTICLE PHYSICS, 2012, 39 (10)