Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection
Traditional hardware error detection methods based on linear codes make assumptions about the typical or expected errors and faults and concentrate the detection power towards the expected errors and faults. These traditional methods are not optimal for the protection of hardware implementations of cryptographic hardware against fault attacks. An adversary performing a fault-based attack can be unpredictable and exploit weaknesses in the traditional implementations. To detect these attacks where no assumptions about expected error or fault distributions should be made we propose and motivate an architecture based on robust nonlinear systematic (n,k)-error-detecting codes. These code can provide uniform error detecting coverage independently of the error distributions. They make no assumptions about what faults or errors will be injected by an attacker and have fewer undetectable errors than linear codes with the same (n,k). We also present optimization approaches which provide for a tradeoff between the levels of robustness and required overhead for hardware implementations.
KeywordsSmart Card Linear Code Advance Encryption Standard Protection Method Code Versus
Unable to display preview. Download preview PDF.
- 1.Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513–525. Springer, Heidelberg (1997)Google Scholar
- 2.FIPS PUB 197: Advanced Encryption Standard, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
- 3.Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The Sorcerer’s Apprentice Guide to Fault Attacks. Cryptology ePrint Archive, Report 2004/100, Available: http://eprint.iacr.org/2004/100.pdf
- 6.Dusart, P., Letourneux, G., Vivolo, O.: Differential Fault Analysis on AES. Cryptology ePrint Archive, Report 2003/010, Available: http://eprint.iacr.org/2003/010.pdf
- 7.Giraud, C.: DFA on AES. Cryptology ePrint Archive, Report 2003/008, Available: http://eprint.iacr.org
- 12.Bertoni, G., Breveglieri, L., Koren, I., Maistri, P., Piuri, V.: Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard. IEEE Transactions on Computers 52(4) (2003)Google Scholar
- 13.Karpovsky, M.G., Kulikowski, K., Taubin, A.: Robust Protection against Fault-Injection Attacks of Smart Cards Implementing the Advanced Encryption Standard. In: Proc. Int. Conference on Dependable Systems and Networks (DNS 2004) (July 2004)Google Scholar
- 14.Karpovsky, M.G., Kulikowski, K., Taubin, A.: Differential Fault Analysis Attack Resistant Architectures for the Advanced Encryption Standard. In: Proc. World Computing Congress, Cardis (August 2004)Google Scholar
- 16.Karpovsky, M.G., Nagvajara, P.: Optimal Codes for the Minimax Criterion on Error Detection. IEEE Trans. on Information Theory (November 1989)Google Scholar