A-SOFT-AES: Self-Adaptive Software-Implemented Fault-Tolerance for AES

被引:0
作者
Oboril, Fabian [1 ]
Sagar, Ilias [1 ]
Tahoori, Mehdi B. [1 ]
机构
[1] Karlsruhe Inst Technol, CDNC, D-76021 Karlsruhe, Germany
来源
PROCEEDINGS OF THE 2013 IEEE 19TH INTERNATIONAL ON-LINE TESTING SYMPOSIUM (IOLTS) | 2013年
关键词
CONCURRENT ERROR-DETECTION; KEY SCHEDULE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Advanced Encryption Standard (AES) is one of the most widespread encryption techniques used by millions of users worldwide. Although AES was designed to withstand linear or differential attacks, the security of encrypted messages is not guaranteed. Bit flips occurring during the encryption due to runtime failures or purposely invoked by an attacker are a major security concern and can significantly jeopardize integrity, privacy, and confidentiality and hence the security of the system. Therefore, techniques to increase the reliability (fault-tolerance) and with it the security of cryptographic systems are necessary. This work proposes a self-adaptive software-implemented fault-tolerance methodology for AES (A-SOFT-AES) to enhance its fault-tolerance. This technique is based on a pool of software-implemented fault-tolerance techniques out of which it dynamically chooses the best one in terms of performance, cost, and fault-tolerance for a wide range of fault rates. Therefore, it provides superior flexibility over classic hardware-based implementations.
引用
收藏
页码:104 / 109
页数:6
相关论文
共 19 条
[1]  
[Anonymous], 2007, P 37 ANN IEEE IFIP I
[2]  
Barenghi A, 2012, P IEEE, V100, P3056, DOI 10.1109/JPROC.2012.2188769
[3]   Error analysis and detection procedures for a hardware implementation of the Advanced Encryption Standard [J].
Bertoni, G ;
Breveglieri, L ;
Koren, I ;
Maistri, P ;
Piuri, V .
IEEE TRANSACTIONS ON COMPUTERS, 2003, 52 (04) :492-505
[4]  
Biham E, 1997, LECT NOTES COMPUT SC, V1294, P513
[5]  
Blömer J, 2003, LECT NOTES COMPUT SC, V2742, P162
[6]   On the importance of eliminating errors in cryptographic computations [J].
Boneh, D ;
DeMillo, RA ;
Lipton, RJ .
JOURNAL OF CRYPTOLOGY, 2001, 14 (02) :101-119
[7]  
Chen CN, 2003, LECT NOTES COMPUT SC, V2727, P118
[8]  
Daemen Joan, 2020, Information Security and Cryptography, V2nd
[9]  
Dusart P, 2003, LECT NOTES COMPUT SC, V2846, P293
[10]  
Fips N., 2001, INFORM TECHNOLOGY LA, V5