Cryptology ePrint Archive: Report 2015/493

Fault Tolerant Infective Countermeasure for AES

Sikhar Patranabis and Abhishek Chakraborty and Debdeep Mukhopadhyay

Abstract: Infective countermeasures have been a promising class of fault attack countermeasures. However, they have been subjected to several attacks owing to lack of formal proofs of security and improper implementations. In this paper, we first provide a formal information theoretic proof of security for one of the most recently proposed infective countermeasures against DFA, under the assumption that the adversary does not change the flow sequence or skip any instruction. Subsequently, we identify weaknesses in the infection mechanism of the countermeasure that could be exploited by attacks which change the flow sequence. We propose suitable randomizations to reduce the success probabilities of such attacks. Furthermore, we develop a fault tolerant implementation of the countermeasure using the x86 instruction set to make such attacks which attempt to change the control flow of the algorithm practically infeasible. All the claims have been validated by supporting simulations and real life experiments on a SASEBO-W platform. We also compare the performance and security provided by the proposed countermeasure against that provided by the existing scheme.

Category / Keywords: Infective Countermeasure, AES, Randomization, Instruction Skip, Fault Attack, Fault Tolerant

Date: received 24 May 2015

Contact author: sikharpatranabis at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20150525:144816 (All versions of this report)

Short URL: ia.cr/2015/493

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]