Protecting Block Ciphers against Differential Fault Attacks without Re-keying

被引:0
|
作者
Baksi, Anuhhah [1 ]
Bhasin, Shivam [2 ]
Breier, Jakub [2 ]
Khairallah, Mustafa [3 ]
Peyrin, Thomas [1 ,2 ,3 ]
机构
[1] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore, Singapore
[2] Nanyang Technol Univ, Temasek Labs, Singapore, Singapore
[3] Nanyang Technol Univ, Sch Phys & Math Sci, Singapore, Singapore
基金
新加坡国家研究基金会;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we propose a new method to protect block cipher implementations against Differential Fault Attacks (DFA). Our strategy, so-called "Tweak-in-Plaintext", ensures that an uncontrolled value ('tweak-in') is inserted into some part of the block cipher plaintext, thus effectively rendering DFA much harder to perform. Our method is extremely simple yet presents many advantages when compared to previous solutions proposed at AFRICACRYPT 2010 or CARDIS 2015. Firstly, we do not need any Tweakable block cipher, nor any related-key security assumption (we do not perform any re-keying). Moreover, performance for lightweight applications is improved, and we do not need to send any extra data. Finally, our scheme can be directly used with standard block ciphers such as AES or PRESENT. Experimental results show that the throughput overheads, for incorporating our scheme into AES-128, range between approximate to 5% to approximate to 26.9% for software, and between approximate to 3.1% to approximate to 25% for hardware implementations; depending on the tweakin size.
引用
收藏
页码:191 / 194
页数:4
相关论文
共 50 条
  • [1] Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
    Medwed, Marcel
    Standaert, Francois-Xavier
    Grossschaedl, Johann
    Regazzoni, Francesco
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 279 - +
  • [2] Fault Template Attacks on Block Ciphers Exploiting Fault Propagation
    Saha, Sayandeep
    Bag, Arnab
    Roy, Debapriya Basu
    Patranabis, Sikhar
    Mukhopadhyay, Debdeep
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I, 2020, 12105 : 612 - 643
  • [3] Impossible differential attacks on the SKINNY family of block ciphers
    Yang, Dong
    Qi, Wen-Feng
    Chen, Hua-Jin
    IET INFORMATION SECURITY, 2017, 11 (06) : 377 - 385
  • [4] Further Analysis of Block Ciphers against Timing Attacks
    LI Wei~ 1
    2. State Key Laboratory of Modern Communications
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1629 - 1632
  • [5] Differential Random Fault Attacks on Certain CAESAR Stream Ciphers
    Wong, Kenneth Koon-Ho
    Bartlett, Harry
    Simpson, Leonie
    Dawson, Ed
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2019, 2020, 11975 : 297 - 315
  • [6] On Protecting SPHINCS+ Against Fault Attacks
    Genêt A.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (02): : 80 - 114
  • [7] Protecting against statistical ineffective fault attacks
    Daemen J.
    Dobraunig C.
    Eichlseder M.
    Gross H.
    Mendel F.
    Primas R.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (03): : 508 - 543
  • [8] Exploration of Benes Network in Cryptographic Processors: A Random Infection Countermeasure for Block Ciphers Against Fault Attacks
    Wang, Bo
    Liu, Leibo
    Deng, Chenchen
    Zhu, Min
    Yin, Shouyi
    Zhou, Zhuoquan
    Wei, Shaojun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (02) : 309 - 322
  • [9] Designing against a class of algebraic attacks on symmetric block ciphers
    Adams, C
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2006, 17 (01) : 17 - 27
  • [10] Designing against a class of algebraic attacks on symmetric block ciphers
    Carlisle Adams
    Applicable Algebra in Engineering, Communication and Computing, 2006, 17 : 17 - 27