On evaluating fault resilient encoding schemes in software

Cryptographic implementations are often vulnerable against physical attacks, fault injection analysis being among the most popular techniques. On par with development of attacks, the area of countermeasures is advancing rapidly, utilizing both hardware- and software-based approaches. When it comes t...

Full description

Saved in:
Bibliographic Details
Main Authors: Breier, Jakub, Hou, Xiaolu, Liu, Yang
Other Authors: School of Computer Science and Engineering
Format: Article
Language:English
Published: 2021
Subjects:
Online Access:https://hdl.handle.net/10356/151844
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-151844
record_format dspace
spelling sg-ntu-dr.10356-1518442021-07-05T02:54:34Z On evaluating fault resilient encoding schemes in software Breier, Jakub Hou, Xiaolu Liu, Yang School of Computer Science and Engineering Engineering::Computer science and engineering::Data::Data encryption Fault Injection Attacks Encoding Schemes Cryptographic implementations are often vulnerable against physical attacks, fault injection analysis being among the most popular techniques. On par with development of attacks, the area of countermeasures is advancing rapidly, utilizing both hardware- and software-based approaches. When it comes to software encoding countermeasures for fault protection and their evaluation, there are very few proposals so far, mostly focusing on single operations rather than cipher as a whole. In this paper we propose an evaluation framework that can be used for analyzing the effectivity of software encoding countermeasures against fault attacks. We first formalize the encoding schemes in software, helping us to define what properties are required when designing a fault protection. Based on these findings, we develop evaluation metric that can be used universally to determine the robustness of a software encoding scheme against bit flip faults and instruction skips. We provide a way to select a code according to user criteria and also a dynamic code analysis method to estimate the level of protection of assembly implementations using encoding schemes. Finally, we verify our findings by implementing a block cipher PRESENT, protected by encoding scheme based on anticodes, and provide a detailed evaluation of this implementation using different codes. Accepted version 2021-07-05T02:07:47Z 2021-07-05T02:07:47Z 2021 Journal Article Breier, J., Hou, X. & Liu, Y. (2021). On evaluating fault resilient encoding schemes in software. IEEE Transactions On Dependable and Secure Computing, 18(3), 1065-1079. https://dx.doi.org/10.1109/TDSC.2019.2897663 1545-5971 https://hdl.handle.net/10356/151844 10.1109/TDSC.2019.2897663 2-s2.0-85061271660 3 18 1065 1079 en IEEE Transactions on Dependable and Secure Computing © 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/TDSC.2019.2897663 application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Computer science and engineering::Data::Data encryption
Fault Injection Attacks
Encoding Schemes
spellingShingle Engineering::Computer science and engineering::Data::Data encryption
Fault Injection Attacks
Encoding Schemes
Breier, Jakub
Hou, Xiaolu
Liu, Yang
On evaluating fault resilient encoding schemes in software
description Cryptographic implementations are often vulnerable against physical attacks, fault injection analysis being among the most popular techniques. On par with development of attacks, the area of countermeasures is advancing rapidly, utilizing both hardware- and software-based approaches. When it comes to software encoding countermeasures for fault protection and their evaluation, there are very few proposals so far, mostly focusing on single operations rather than cipher as a whole. In this paper we propose an evaluation framework that can be used for analyzing the effectivity of software encoding countermeasures against fault attacks. We first formalize the encoding schemes in software, helping us to define what properties are required when designing a fault protection. Based on these findings, we develop evaluation metric that can be used universally to determine the robustness of a software encoding scheme against bit flip faults and instruction skips. We provide a way to select a code according to user criteria and also a dynamic code analysis method to estimate the level of protection of assembly implementations using encoding schemes. Finally, we verify our findings by implementing a block cipher PRESENT, protected by encoding scheme based on anticodes, and provide a detailed evaluation of this implementation using different codes.
author2 School of Computer Science and Engineering
author_facet School of Computer Science and Engineering
Breier, Jakub
Hou, Xiaolu
Liu, Yang
format Article
author Breier, Jakub
Hou, Xiaolu
Liu, Yang
author_sort Breier, Jakub
title On evaluating fault resilient encoding schemes in software
title_short On evaluating fault resilient encoding schemes in software
title_full On evaluating fault resilient encoding schemes in software
title_fullStr On evaluating fault resilient encoding schemes in software
title_full_unstemmed On evaluating fault resilient encoding schemes in software
title_sort on evaluating fault resilient encoding schemes in software
publishDate 2021
url https://hdl.handle.net/10356/151844
_version_ 1705151291937783808