2016
DOI: 10.1007/978-3-319-45931-8_10
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of a Code-Based Countermeasure Against Side-Channel and Fault Attacks

Abstract: The design of robust countermeasures against Side-Channel Analysis or Fault Attacks is always a challenging task. At WISTP'14, a single countermeasure designed to thwart in the same effort both kinds of attacks was presented. This countermeasure is based on coding theory and consists in a specific encoding of the manipulated data acting in the same time as a random masking and an error detector. In this paper, we prove that this countermeasure does not meet the ambitious objectives claimed by its authors. Inde… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Although ODSM promised a generic countermeasure against SCA and fault analysis, studies of [49] demonstrated that ODSM fails to provide the assumed security. The major vulnerability of ODSM arises from the fact that the random mask added to sensitive variables is not perfectly uniform as opposed to Boolean masking, since the mask is chosen from the orthogonal space to the encoded sensitive variables.…”
Section: Integrated Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…Although ODSM promised a generic countermeasure against SCA and fault analysis, studies of [49] demonstrated that ODSM fails to provide the assumed security. The major vulnerability of ODSM arises from the fact that the random mask added to sensitive variables is not perfectly uniform as opposed to Boolean masking, since the mask is chosen from the orthogonal space to the encoded sensitive variables.…”
Section: Integrated Countermeasuresmentioning
confidence: 99%
“…As a result, the distribution of masked variables cannot be uniform. This property is exploited in [49] to deploy a first order DPA attack to recover the secret key of AES implemented with ODSM scheme. We will also prove that the non-uniform distribution of a mask makes the scheme vulnerable to fault analysis.…”
Section: Integrated Countermeasuresmentioning
confidence: 99%