Breaking redundancy-based countermeasures with random faults and power side channel
Redundancy based countermeasures against fault attacks are a popular choice in security-critical commercial products, owing to its high fault coverage and applications to safety/reliability. In this paper, we propose a combined attack on such countermeasures. The attack assumes a random byte/nibble...
Saved in:
Main Authors: | , , , , , |
---|---|
Other Authors: | |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/104811 http://hdl.handle.net/10220/49291 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-104811 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1048112020-09-26T22:15:10Z Breaking redundancy-based countermeasures with random faults and power side channel Saha, Sayandeep Jap, Dirmanto Breier, Jakub Bhasin, Shivam Mukhopadhyay, Debdeep Dasgupta, Pallab 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) Engineering::Computer science and engineering Fault Attack Side-Channel Redundancy based countermeasures against fault attacks are a popular choice in security-critical commercial products, owing to its high fault coverage and applications to safety/reliability. In this paper, we propose a combined attack on such countermeasures. The attack assumes a random byte/nibble fault model with existence of side-channel leakage of the final comparison, and no knowledge of the faulty ciphertext. Unlike the previously proposed biased/multiple fault attack, we just need to corrupt one computation branch. Both analytical and experimental evaluation of this attack strategy is presented on software implementations of two state-of-the-art block ciphers, AES and PRESENT, on an ATmega328P microcontroller, via side-channel measurements and a laser-based fault injection. Moreover, this work establishes that even without the knowledge of the faulty ciphertexts, one can still perform differential fault analysis attacks, given the availability of side-channel information. Accepted version 2019-07-11T06:39:20Z 2019-12-06T21:40:22Z 2019-07-11T06:39:20Z 2019-12-06T21:40:22Z 2018-12-01 2018 Conference Paper Saha, S., Jap, D., Breier, J., Bhasin, S., Mukhopadhyay, D., & Dasgupta, P. (2018). Breaking redundancy-based countermeasures with random faults and power side channel. 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). doi:10.1109/FDTC.2018.00011 https://hdl.handle.net/10356/104811 http://hdl.handle.net/10220/49291 10.1109/FDTC.2018.00011 212670 en © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/FDTC.2018.00011 8 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
country |
Singapore |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Computer science and engineering Fault Attack Side-Channel |
spellingShingle |
Engineering::Computer science and engineering Fault Attack Side-Channel Saha, Sayandeep Jap, Dirmanto Breier, Jakub Bhasin, Shivam Mukhopadhyay, Debdeep Dasgupta, Pallab Breaking redundancy-based countermeasures with random faults and power side channel |
description |
Redundancy based countermeasures against fault attacks are a popular choice in security-critical commercial products, owing to its high fault coverage and applications to safety/reliability. In this paper, we propose a combined attack on such countermeasures. The attack assumes a random byte/nibble fault model with existence of side-channel leakage of the final comparison, and no knowledge of the faulty ciphertext. Unlike the previously proposed biased/multiple fault attack, we just need to corrupt one computation branch. Both analytical and experimental evaluation of this attack strategy is presented on software implementations of two state-of-the-art block ciphers, AES and PRESENT, on an ATmega328P microcontroller, via side-channel measurements and a laser-based fault injection. Moreover, this work establishes that even without the knowledge of the faulty ciphertexts, one can still perform differential fault analysis attacks, given the availability of side-channel information. |
author2 |
2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) |
author_facet |
2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) Saha, Sayandeep Jap, Dirmanto Breier, Jakub Bhasin, Shivam Mukhopadhyay, Debdeep Dasgupta, Pallab |
format |
Conference or Workshop Item |
author |
Saha, Sayandeep Jap, Dirmanto Breier, Jakub Bhasin, Shivam Mukhopadhyay, Debdeep Dasgupta, Pallab |
author_sort |
Saha, Sayandeep |
title |
Breaking redundancy-based countermeasures with random faults and power side channel |
title_short |
Breaking redundancy-based countermeasures with random faults and power side channel |
title_full |
Breaking redundancy-based countermeasures with random faults and power side channel |
title_fullStr |
Breaking redundancy-based countermeasures with random faults and power side channel |
title_full_unstemmed |
Breaking redundancy-based countermeasures with random faults and power side channel |
title_sort |
breaking redundancy-based countermeasures with random faults and power side channel |
publishDate |
2019 |
url |
https://hdl.handle.net/10356/104811 http://hdl.handle.net/10220/49291 |
_version_ |
1681056609405501440 |