On the Duality of Probing and Fault Attacks

被引:0
作者
Berndt M. Gammel
Stefan Mangard
机构
[1] Infineon Technologies AG,
来源
Journal of Electronic Testing | 2010年 / 26卷
关键词
Probing attacks; Fault attacks; Side channel attacks; Coding theory; Secret sharing; Secure computation;
D O I
暂无
中图分类号
学科分类号
摘要
In this work we investigate the problem of simultaneous privacy and integrity protection in cryptographic circuits. We consider a white-box scenario with a powerful, yet limited attacker. A concise metric for the level of probing and fault security is introduced, which is directly related to the capabilities of a realistic attacker. In order to investigate the interrelation of probing and fault security we introduce a common mathematical framework based on the formalism of information and coding theory. The framework unifies the known linear masking schemes. We proof a central theorem about the properties of linear codes which leads to optimal secret sharing schemes. These schemes provide the lower bound for the number of masks needed to counteract an attacker with a given strength. The new formalism reveals an intriguing duality principle between the problems of probing and fault security, and provides a unified view on privacy and integrity protection using error detecting codes. Finally, we introduce a new class of linear tamper-resistant codes. These are eligible to preserve security against an attacker mounting simultaneous probing and fault attacks.
引用
收藏
页码:483 / 493
页数:10
相关论文
共 10 条
  • [1] Boit C(2008)Physical techniques for Chip-backside IC debug in nanotechnologies IEEE Des Test Comput 25 250-257
  • [2] Schlangen R(2001)On the importance of eliminating errors in cryptographic computations J Cryptol 14 101-119
  • [3] Kerst U(1970)A class of optimal minimum odd-weight-column SEC-DED codes IBM J Res Develop 14 395-401
  • [4] Lundquist T(1949)Communication theory of secrecy systems Bell Syst Tech J 28 656-715
  • [5] Boneh D(1984)Correlation-immunity of nonlinear combining functions for cryptographic applications IEEE Trans Inf Theory 30 776-780
  • [6] DeMillo RA(undefined)undefined undefined undefined undefined-undefined
  • [7] Lipton RJ(undefined)undefined undefined undefined undefined-undefined
  • [8] Hsiao MY(undefined)undefined undefined undefined undefined-undefined
  • [9] Shannon CL(undefined)undefined undefined undefined undefined-undefined
  • [10] Siegenthaler T(undefined)undefined undefined undefined undefined-undefined