2019
DOI: 10.1109/access.2019.2944024
|View full text |Cite
|
Sign up to set email alerts
|

Information Theory-Based Quantitative Evaluation Method for Countermeasures Against Fault Injection Attacks

Abstract: The integrated circuits are faced with the threats of fault injection attacks (FIAs), which employ the faulty results and differential fault analysis to retrieve the vital information processed by the circuits. Countermeasures should be taken to protect the circuits against FIAs. This paper proposes a security evaluation method to quantitatively analyze the resistance of block ciphers with a Substitution-Permutation Network structure against FIAs from an information-theoretic perspective. A quantitative securi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…If the amount of actually leaked information is closer to the upper bound, the attack is more efficient; i.e., circuit designs' security is worse. The approach was extended in our early work [29] to calculate the amount of information leakage based on an extended cipher model.…”
Section: Fault Analysis and Evaluation Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…If the amount of actually leaked information is closer to the upper bound, the attack is more efficient; i.e., circuit designs' security is worse. The approach was extended in our early work [29] to calculate the amount of information leakage based on an extended cipher model.…”
Section: Fault Analysis and Evaluation Methodsmentioning
confidence: 99%
“…These terms have some overlapping meanings, but also some different attributes. This article focuses on evaluating the confidentiality attribute for cipher circuit designs and the fault-tolerance attribute for the nonencryption circuit design, based on the information-theoretic-based approach [29]. The evaluation on the two specific attributes demonstrates the application of the proposed framework.…”
Section: Fault Analysis and Evaluation Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…For instance, symmetric encryption within modern cryptography, such as the Advanced Encryption Standard (AES). A key of rounds can be easily obtained by the Correlation Power Attack (CPA) [9][10] [11] of physics leakage or the Fault Injection Attack (FIA) [12][13] [14]. Then all the round-keys can be recovered with the explicit mapping relationship of key expansion.…”
Section: Introductionmentioning
confidence: 99%