Attacks in Reality: The Limits of Concurrent Error Detection Codes against Laser Fault Injection

As a prominent attack approach against the security modules of integrated circuits, fault injection attacks (FIA) are able to breach thecryptographic primitives by analyzing the intentionally induced computation errors by adversaries. Parity-based Concurrent Error Detection (CED) techniques are ofte...

Full description

Saved in:
Bibliographic Details
Main Authors: Breier, Jakub, He, Wei, Jap, Dirmanto, Bhasin, Shivam, Chattopadhyay, Anupam
Other Authors: School of Computer Science and Engineering
Format: Article
Language:English
Published: 2018
Subjects:
Online Access:https://hdl.handle.net/10356/88765
http://hdl.handle.net/10220/44736
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-88765
record_format dspace
spelling sg-ntu-dr.10356-887652020-03-07T11:48:59Z Attacks in Reality: The Limits of Concurrent Error Detection Codes against Laser Fault Injection Breier, Jakub He, Wei Jap, Dirmanto Bhasin, Shivam Chattopadhyay, Anupam School of Computer Science and Engineering Temasek Laboratories Cryptography Hardware Security As a prominent attack approach against the security modules of integrated circuits, fault injection attacks (FIA) are able to breach thecryptographic primitives by analyzing the intentionally induced computation errors by adversaries. Parity-based Concurrent Error Detection (CED) techniques are often deployed as a countermeasure, owing to their low-overhead. Advanced linear and non-linear randomized encodings can be employed for constructing varying CED schemes. In this paper, we first evaluate the detection capability of linear parity-protected ciphers implemented in commercial FPGA, using laser fault injection (LFI) technique. A single-bit linear parity scheme is shown to be ineffective for error detection, since the LFI can typically flip multiple bits that are close to each other. On the other hand, a linear randomized parity scheme, with multiple bits parity, shows higher detection rates. Further, we study existing (randomized) non-linear encoding-based CED. With practical fault distributions on PRESENT cipher, non-linear randomized codes are extensively tested against fault injection. Although, known to have better theoretical detection bounds, non-linear encodings do not provide much improvements over simple randomized linear codes. Accepted version 2018-05-03T03:09:04Z 2019-12-06T17:10:29Z 2018-05-03T03:09:04Z 2019-12-06T17:10:29Z 2017 2017 Journal Article Breier, J., He, W., Jap, D., Bhasin, S., & Chattopadhyay, A. (2017). Attacks in Reality: The Limits of Concurrent Error Detection Codes against Laser Fault Injection. Journal of Hardware and Systems Security, 1(4), 298-310. 2509-3428 https://hdl.handle.net/10356/88765 http://hdl.handle.net/10220/44736 10.1007/s41635-017-0020-3 206721 en Journal of Hardware and Systems Security © 2017 Springer International Publishing AG. This is the author created version of a work that has been peer reviewed and accepted for publication by Journal of Hardware and Systems Security, Springer International Publishing AG. It incorporates referee’s comments but changes resulting from the publishing process, such as copyediting, structural formatting, may not be reflected in this document. The published version is available at: [http://dx.doi.org/10.1007/s41635-017-0020-3]. 12 p. application/pdf
institution Nanyang Technological University
building NTU Library
country Singapore
collection DR-NTU
language English
topic Cryptography
Hardware Security
spellingShingle Cryptography
Hardware Security
Breier, Jakub
He, Wei
Jap, Dirmanto
Bhasin, Shivam
Chattopadhyay, Anupam
Attacks in Reality: The Limits of Concurrent Error Detection Codes against Laser Fault Injection
description As a prominent attack approach against the security modules of integrated circuits, fault injection attacks (FIA) are able to breach thecryptographic primitives by analyzing the intentionally induced computation errors by adversaries. Parity-based Concurrent Error Detection (CED) techniques are often deployed as a countermeasure, owing to their low-overhead. Advanced linear and non-linear randomized encodings can be employed for constructing varying CED schemes. In this paper, we first evaluate the detection capability of linear parity-protected ciphers implemented in commercial FPGA, using laser fault injection (LFI) technique. A single-bit linear parity scheme is shown to be ineffective for error detection, since the LFI can typically flip multiple bits that are close to each other. On the other hand, a linear randomized parity scheme, with multiple bits parity, shows higher detection rates. Further, we study existing (randomized) non-linear encoding-based CED. With practical fault distributions on PRESENT cipher, non-linear randomized codes are extensively tested against fault injection. Although, known to have better theoretical detection bounds, non-linear encodings do not provide much improvements over simple randomized linear codes.
author2 School of Computer Science and Engineering
author_facet School of Computer Science and Engineering
Breier, Jakub
He, Wei
Jap, Dirmanto
Bhasin, Shivam
Chattopadhyay, Anupam
format Article
author Breier, Jakub
He, Wei
Jap, Dirmanto
Bhasin, Shivam
Chattopadhyay, Anupam
author_sort Breier, Jakub
title Attacks in Reality: The Limits of Concurrent Error Detection Codes against Laser Fault Injection
title_short Attacks in Reality: The Limits of Concurrent Error Detection Codes against Laser Fault Injection
title_full Attacks in Reality: The Limits of Concurrent Error Detection Codes against Laser Fault Injection
title_fullStr Attacks in Reality: The Limits of Concurrent Error Detection Codes against Laser Fault Injection
title_full_unstemmed Attacks in Reality: The Limits of Concurrent Error Detection Codes against Laser Fault Injection
title_sort attacks in reality: the limits of concurrent error detection codes against laser fault injection
publishDate 2018
url https://hdl.handle.net/10356/88765
http://hdl.handle.net/10220/44736
_version_ 1681049506165030912