A comparative cost/security analysis of fault attack countermeasures

被引:0
|
作者
Malkin, Tal G. [1 ]
Standaert, Francois-Xavier
Yungi, Moti
机构
[1] Columbia Univ, Dept Comp Sci, New York, NY 10027 USA
[2] Catholic Univ Louvain, Crypto Grp, B-3000 Louvain, Belgium
关键词
attacks and countermeasures in hardware and software;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Deliberate injection of faults into cryptographic devices is an effective cryptanalysis technique against symmetric and asymmetric encryption algorithms. To protect cryptographic implementations (e.g. of the recent AES which will be our running example) against these attacks, a number of innovative countermeasures have been proposed, usually based on the use of space and time redundancies (e.g. error detection/correction techniques, repeated computations). In this paper, we take the next natural step in engineering studies where alternative methods exist, namely, we take a comparative perspective. For this purpose, we use unified security and efficiency metrics to evaluate various recent protections against fault attacks. The comparative study reveals security weaknesses in some of the countermeasures (e.g. intentional malicious fault injection that are unrealistically modelled). The study also demonstrates that, if fair performance evaluations are performed, many countermeasures are not better than the naive solutions, namely duplication or repetition. We finally suggest certain design improvements for some countermeasures, and further discuss security/efficiency tradeoffs.
引用
收藏
页码:159 / 172
页数:14
相关论文
共 50 条
  • [21] Exploring the landscape of network security: a comparative analysis of attack detection strategies
    Rajesh Kanna P.
    Santhi P.
    Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (08) : 3211 - 3228
  • [22] Differential Power Analysis Attack and Countermeasures on MCrypton
    Wang, Sixiang
    Cui, Qi
    Gao, Xianwei
    Zhang, Lei
    Duan, Xiaoyi
    PROCEEDINGS OF 2016 IEEE ADVANCED INFORMATION MANAGEMENT, COMMUNICATES, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IMCEC 2016), 2016, : 167 - 172
  • [23] The Analysis and Countermeasures on Security Breach of Bitcoin
    Lim, Il-Kwon
    Kim, Young-Hyuk
    Lee, Jae-Gwang
    Lee, Jae-Pil
    Nam-Gung, Hyun
    Lee, Jae-Kwang
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2014, PT IV, 2014, 8582 : 720 - 732
  • [24] Security Attack Analysis Using Attack Patterns
    Li, Tong
    Paja, Elda
    Mylopoulos, John
    Horkoff, Jennifer
    Beckers, Kristian
    2016 IEEE TENTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2016, : 513 - 525
  • [25] Strengthening the Security of AES Against Differential Fault Attack
    Ghosal, Anit Kumar
    Roychowdhury, Dipanwita
    NETWORK AND SYSTEM SECURITY, NSS 2022, 2022, 13787 : 727 - 744
  • [26] FPGA Bitstream Fault Injection Attack and Countermeasures on the Sampling Counter in CRYSTALS Kyber
    Ni, Ziying
    Khalid, Ayesha
    Liu, Weiqiang
    O'Neill, Maire
    2024 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS 2024, 2024,
  • [27] Comparative analysis of robust fault attack resistant architectures for public and private cryptosystems
    Kulikowski, Konrad J.
    Wang, Zhen
    Karpovsky, Mark G.
    FDTC 2008: FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY, PROCEEDINGS, 2008, : 41 - +
  • [28] VoWi-Fi security threats: Address resolution protocol attack and countermeasures
    Lu, Kuan-Chu
    Liu, I. -Hsien
    Chang, Keng-Hao
    Li, Jung-Shian
    IET NETWORKS, 2024, 13 (02) : 129 - 146
  • [29] Wireless Network-on-Chip Security Review: Attack Taxonomy, Implications, and Countermeasures
    Kondoth, Lashmi
    Shankaran, Rajan
    Sheng, Quan Z.
    Han, Richard
    IEEE ACCESS, 2023, 11 : 122876 - 122892
  • [30] Analysis on Internet Attack and Security
    Chen, Jing
    ADVANCED DESIGNS AND RESEARCHES FOR MANUFACTURING, PTS 1-3, 2013, 605-607 : 2387 - 2390