2018 IEEE International Symposium on Circuits and Systems (ISCAS) 2018
DOI: 10.1109/iscas.2018.8351693
|View full text |Cite
|
Sign up to set email alerts
|

Thwarting Fault Attacks against Lightweight Cryptography using SIMD Instructions

Abstract: A growing number of connected objects, with their high performance and low-resources constraints, are embedding lightweight ciphers for protecting the confidentiality of the data they manipulate or store. Since those objects are easily accessible, they are prone to a whole range of physical attacks, one of which are fault attacks against for which countermeasures are usually expensive to implement, especially on off-the-shelf devices. For such devices, we propose a new generic software countermeasure, called t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 43 publications
0
10
0
Order By: Relevance
“…Conditionals in a Boolean program are implemented through data-multiplexing: both results are sequentially computed and the relevant output is obtained by demultiplexing these intermediary results based on the conditional. Finally, the massively parallel nature of a bitsliced implementation can be exploited to provide intra-instruction redundancy (encrypting the same data in redundant slices) as well as various forms of temporal redundancy (processing data at distinct rounds in distinct, randomly-chosen slices) [37,32]. In a bitsliced setting, these techniques translate into end-to-end protection, protecting a cipher from the moment the plaintext is introduced to the moment the ciphertext is produced.…”
Section: Preliminariesmentioning
confidence: 99%
See 1 more Smart Citation
“…Conditionals in a Boolean program are implemented through data-multiplexing: both results are sequentially computed and the relevant output is obtained by demultiplexing these intermediary results based on the conditional. Finally, the massively parallel nature of a bitsliced implementation can be exploited to provide intra-instruction redundancy (encrypting the same data in redundant slices) as well as various forms of temporal redundancy (processing data at distinct rounds in distinct, randomly-chosen slices) [37,32]. In a bitsliced setting, these techniques translate into end-to-end protection, protecting a cipher from the moment the plaintext is introduced to the moment the ciphertext is produced.…”
Section: Preliminariesmentioning
confidence: 99%
“…We protect our implementation against data faults using intra-instruction redundancy (IIR) [37,32,15]. We support either a direct redundant implementation, in which the duplicated slices contain the same value, or a complementary redundant implementation, in which the duplicated slices are complemented pairwise.…”
Section: Data-redundant Computationmentioning
confidence: 99%
“…This paper states that depending on the floorplanning used during the implementation process, it is possible to difficult fault injections, but does not constitute a countermeasure as such. In [23], a software countermeasure is presented where the so-called Single Instruction Multiple Data instructions are used, where redundancies are implemented in data processing to avoid injection of faults. The paper [24] presents two algorithm-level countermeasures focused on preventing DPA attacks on the Trivium cipher, but not against fault injections.…”
Section: Comparative With Other Schemesmentioning
confidence: 99%
“…The frequency costs of the different proposed designs range from 0.72 to 0.96. Regarding [23], we can see that it is a software-oriented scheme and therefore resource consumption is not applicable. In this proposal, no fault coverage is provided and the frequency degradation is below the schemes proposed in this paper.…”
Section: Comparative With Other Schemesmentioning
confidence: 99%
“…Software countermeasures can be based for example on coding theory [BH16, BCC + 14], instruction redundancy [PYGS16,LCFS17], or infection [GST12]. We note that TADA is capable of analyzing single bit flip vulnerabilities and therefore, it can check whether the countermeasure was implemented sufficiently.…”
Section: Tada Usagementioning
confidence: 99%