Breaking redundancy-based countermeasures with random faults and power side channel

Redundancy based countermeasures against fault attacks are a popular choice in security-critical commercial products, owing to its high fault coverage and applications to safety/reliability. In this paper, we propose a combined attack on such countermeasures. The attack assumes a random byte/nibble...

Full description

Saved in:
Bibliographic Details
Main Authors: Saha, Sayandeep, Jap, Dirmanto, Breier, Jakub, Bhasin, Shivam, Mukhopadhyay, Debdeep, Dasgupta, Pallab
Other Authors: 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)
Format: Conference or Workshop Item
Language:English
Published: 2019
Subjects:
Online Access:https://hdl.handle.net/10356/104811
http://hdl.handle.net/10220/49291
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-104811
record_format dspace
spelling sg-ntu-dr.10356-1048112020-09-26T22:15:10Z Breaking redundancy-based countermeasures with random faults and power side channel Saha, Sayandeep Jap, Dirmanto Breier, Jakub Bhasin, Shivam Mukhopadhyay, Debdeep Dasgupta, Pallab 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) Engineering::Computer science and engineering Fault Attack Side-Channel Redundancy based countermeasures against fault attacks are a popular choice in security-critical commercial products, owing to its high fault coverage and applications to safety/reliability. In this paper, we propose a combined attack on such countermeasures. The attack assumes a random byte/nibble fault model with existence of side-channel leakage of the final comparison, and no knowledge of the faulty ciphertext. Unlike the previously proposed biased/multiple fault attack, we just need to corrupt one computation branch. Both analytical and experimental evaluation of this attack strategy is presented on software implementations of two state-of-the-art block ciphers, AES and PRESENT, on an ATmega328P microcontroller, via side-channel measurements and a laser-based fault injection. Moreover, this work establishes that even without the knowledge of the faulty ciphertexts, one can still perform differential fault analysis attacks, given the availability of side-channel information. Accepted version 2019-07-11T06:39:20Z 2019-12-06T21:40:22Z 2019-07-11T06:39:20Z 2019-12-06T21:40:22Z 2018-12-01 2018 Conference Paper Saha, S., Jap, D., Breier, J., Bhasin, S., Mukhopadhyay, D., & Dasgupta, P. (2018). Breaking redundancy-based countermeasures with random faults and power side channel. 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). doi:10.1109/FDTC.2018.00011 https://hdl.handle.net/10356/104811 http://hdl.handle.net/10220/49291 10.1109/FDTC.2018.00011 212670 en © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/FDTC.2018.00011 8 p. application/pdf
institution Nanyang Technological University
building NTU Library
country Singapore
collection DR-NTU
language English
topic Engineering::Computer science and engineering
Fault Attack
Side-Channel
spellingShingle Engineering::Computer science and engineering
Fault Attack
Side-Channel
Saha, Sayandeep
Jap, Dirmanto
Breier, Jakub
Bhasin, Shivam
Mukhopadhyay, Debdeep
Dasgupta, Pallab
Breaking redundancy-based countermeasures with random faults and power side channel
description Redundancy based countermeasures against fault attacks are a popular choice in security-critical commercial products, owing to its high fault coverage and applications to safety/reliability. In this paper, we propose a combined attack on such countermeasures. The attack assumes a random byte/nibble fault model with existence of side-channel leakage of the final comparison, and no knowledge of the faulty ciphertext. Unlike the previously proposed biased/multiple fault attack, we just need to corrupt one computation branch. Both analytical and experimental evaluation of this attack strategy is presented on software implementations of two state-of-the-art block ciphers, AES and PRESENT, on an ATmega328P microcontroller, via side-channel measurements and a laser-based fault injection. Moreover, this work establishes that even without the knowledge of the faulty ciphertexts, one can still perform differential fault analysis attacks, given the availability of side-channel information.
author2 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)
author_facet 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)
Saha, Sayandeep
Jap, Dirmanto
Breier, Jakub
Bhasin, Shivam
Mukhopadhyay, Debdeep
Dasgupta, Pallab
format Conference or Workshop Item
author Saha, Sayandeep
Jap, Dirmanto
Breier, Jakub
Bhasin, Shivam
Mukhopadhyay, Debdeep
Dasgupta, Pallab
author_sort Saha, Sayandeep
title Breaking redundancy-based countermeasures with random faults and power side channel
title_short Breaking redundancy-based countermeasures with random faults and power side channel
title_full Breaking redundancy-based countermeasures with random faults and power side channel
title_fullStr Breaking redundancy-based countermeasures with random faults and power side channel
title_full_unstemmed Breaking redundancy-based countermeasures with random faults and power side channel
title_sort breaking redundancy-based countermeasures with random faults and power side channel
publishDate 2019
url https://hdl.handle.net/10356/104811
http://hdl.handle.net/10220/49291
_version_ 1681056609405501440