A comparative cost/security analysis of fault attack countermeasures

被引:0
|
作者
Malkin, Tal G. [1 ]
Standaert, Francois-Xavier
Yungi, Moti
机构
[1] Columbia Univ, Dept Comp Sci, New York, NY 10027 USA
[2] Catholic Univ Louvain, Crypto Grp, B-3000 Louvain, Belgium
关键词
attacks and countermeasures in hardware and software;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Deliberate injection of faults into cryptographic devices is an effective cryptanalysis technique against symmetric and asymmetric encryption algorithms. To protect cryptographic implementations (e.g. of the recent AES which will be our running example) against these attacks, a number of innovative countermeasures have been proposed, usually based on the use of space and time redundancies (e.g. error detection/correction techniques, repeated computations). In this paper, we take the next natural step in engineering studies where alternative methods exist, namely, we take a comparative perspective. For this purpose, we use unified security and efficiency metrics to evaluate various recent protections against fault attacks. The comparative study reveals security weaknesses in some of the countermeasures (e.g. intentional malicious fault injection that are unrealistically modelled). The study also demonstrates that, if fair performance evaluations are performed, many countermeasures are not better than the naive solutions, namely duplication or repetition. We finally suggest certain design improvements for some countermeasures, and further discuss security/efficiency tradeoffs.
引用
收藏
页码:159 / 172
页数:14
相关论文
共 50 条
  • [41] Enhancing IoT Device Security: A Comparative Analysis of Machine Learning Algorithms for Attack Detection
    Alzahrani, Abdulaziz
    Alshammari, Abdulaziz
    FORTHCOMING NETWORKS AND SUSTAINABILITY IN THE AIOT ERA, VOL 1, FONES-AIOT 2024, 2024, 1035 : 71 - 91
  • [42] Lightweight Design-for-Security Strategies for Combined Countermeasures Against Side Channel and Fault Analysis in IoT Applications
    Sikhar Patranabis
    Debapriya Basu Roy
    Anirban Chakraborty
    Naveen Nagar
    Astikey Singh
    Debdeep Mukhopadhyay
    Santosh Ghosh
    Journal of Hardware and Systems Security, 2019, 3 (2) : 103 - 131
  • [43] A Comparative Analysis of Network Dependability, Fault-tolerance, Reliability, Security, and Survivability
    Al-Kuwaiti, M.
    Kyriakopoulos, N.
    Hussein, S.
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (02): : 106 - 124
  • [44] Theoretical analysis of persistent fault attack
    Fan ZHANG
    Guorui XU
    Bolin YANG
    Ziyuan LIANG
    Kui REN
    ScienceChina(InformationSciences), 2020, 63 (03) : 234 - 239
  • [45] Theoretical analysis of persistent fault attack
    Zhang, Fan
    Xu, Guorui
    Yang, Bolin
    Liang, Ziyuan
    Ren, Kui
    SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (03)
  • [46] Theoretical analysis of persistent fault attack
    Fan Zhang
    Guorui Xu
    Bolin Yang
    Ziyuan Liang
    Kui Ren
    Science China Information Sciences, 2020, 63
  • [47] CubeSat Security Attack Tree Analysis
    Falco, Gregory
    Viswanathan, Arun
    Santangelo, Andrew
    8TH IEEE INTERNATIONAL CONFERENCE ON SPACE MISSION CHALLENGES FOR INFORMATION TECHNOLOGY (SMC-IT 2021), 2021, : 68 - 76
  • [48] Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
    Yu, Yanli
    Li, Keqiu
    Zhou, Wanlei
    Li, Ping
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) : 867 - 880
  • [49] Security attack analysis of safety systems
    Hansen, Kai
    2009 IEEE CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION (EFTA 2009), 2009,
  • [50] An Overview of Security in CoAP: Attack and Analysis
    Arvind, S.
    Narayanan, V. Anantha
    2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 655 - 660