A comparative cost/security analysis of fault attack countermeasures

被引:0
|
作者
Malkin, Tal G. [1 ]
Standaert, Francois-Xavier
Yungi, Moti
机构
[1] Columbia Univ, Dept Comp Sci, New York, NY 10027 USA
[2] Catholic Univ Louvain, Crypto Grp, B-3000 Louvain, Belgium
关键词
attacks and countermeasures in hardware and software;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Deliberate injection of faults into cryptographic devices is an effective cryptanalysis technique against symmetric and asymmetric encryption algorithms. To protect cryptographic implementations (e.g. of the recent AES which will be our running example) against these attacks, a number of innovative countermeasures have been proposed, usually based on the use of space and time redundancies (e.g. error detection/correction techniques, repeated computations). In this paper, we take the next natural step in engineering studies where alternative methods exist, namely, we take a comparative perspective. For this purpose, we use unified security and efficiency metrics to evaluate various recent protections against fault attacks. The comparative study reveals security weaknesses in some of the countermeasures (e.g. intentional malicious fault injection that are unrealistically modelled). The study also demonstrates that, if fair performance evaluations are performed, many countermeasures are not better than the naive solutions, namely duplication or repetition. We finally suggest certain design improvements for some countermeasures, and further discuss security/efficiency tradeoffs.
引用
收藏
页码:159 / 172
页数:14
相关论文
共 50 条
  • [11] Security Countermeasures Selection Using the Meta Attack Language and Probabilistic Attack Graphs
    Widel, Wojciech
    Mukherjee, Preetam
    Ekstedt, Mathias
    IEEE ACCESS, 2022, 10 : 89645 - 89662
  • [12] Communication Architecture Under Siege: An In-depth Analysis of Fault Attack Vulnerabilities and Countermeasures
    Zhao, Hongwei
    Lapotre, Vianney
    Gogniat, Guy
    2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 890 - 896
  • [13] Man-In-The-Middle attacks on Bluetooth:: A comparative analysis, a novel attack, and countermeasures
    Haataja, Keijo M. J.
    Hypponen, Konstantin
    2008 3RD INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS, CONTROL AND SIGNAL PROCESSING, VOLS 1-3, 2008, : 1096 - 1102
  • [14] Optimizing System Architecture Cost and Security Countermeasures
    Berro, Sahar
    Apvrille, Ludovic
    Duc, Guillaume
    GRAPHICAL MODELS FOR SECURITY, GRAMSEC 2019, 2019, 11720 : 50 - 67
  • [15] Breaking Fault Attack Countermeasures With Side-Channel Information
    Zheng, Shihui
    Xing, Ruihao
    Lai, Junlong
    Liu, Junkai
    Wang, Haofeng
    Ou, Changhai
    IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (05) : 1396 - 1408
  • [16] Analysis of Security Vulnerabilities and Countermeasures
    Son, Hyun-Min
    Joo, Nak-Keun
    Choi, Hyun-Taek
    Lee, Hyun-Cheol
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (02): : 200 - 206
  • [17] Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography
    Howe, James
    Khalid, Ayesha
    Martinoli, Marco
    Regazzoni, Francesco
    Oswald, Elisabeth
    2019 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2019,
  • [18] Machine Learning based IoT Edge Node Security Attack and Countermeasures
    Laguduva, Vishalini R.
    Islam, Sheikh Ariful
    Aakur, Sathyanarayanan
    Katkoori, Srinivas
    Karam, Robert
    2019 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2019), 2019, : 672 - 677
  • [19] Common Points on Elliptic Curves: The Achilles' Heel of Fault Attack Countermeasures
    Battistello, Alberto
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, 2014, 8622 : 69 - 81
  • [20] Countermeasures for hardware fault attack in multi-prime RSA cryptosystems
    Abid, Zine-Eddine
    Wang, Wei
    International Journal of Network Security, 2008, 6 (02) : 190 - 200