Cryptology ePrint Archive: Report 2015/806
Using State Space Encoding To Counter Biased Fault Attacks on AES Countermeasures
Sikhar Patranabis and Abhishek Chakraborty and Debdeep Mukhopadhyay and P.P. Chakrabarti
Abstract: Biased fault attacks such as the Differential Fault Intensity Analysis (DFIA) have been a major threat to cryptosystems in recent times. DFIA combines principles of side channel analysis and fault attacks to try and extract the key using faulty ciphertexts only. Biased fault attacks have also been shown to weaken traditional redundancy based countermeasures, such as Concurrent Error Detection (CED) techniques, that provide security against classical fault attacks such as Differential Fault Analysis (DFA). While these countermeasures are effective under the assumption that the adversary uses a uniform fault model, they are vulnerable to attacks using biased fault models. Till date, no effective countermeasure against such biased fault attacks has been reported in literature. In this work, we propose a countermeasure strategy that combines the principles of redundancy with that of fault space transformation to achieve security against both classical and biased fault attacks. The novelty in the proposed countermeasure lies in the concept of transforming the fault space, that reduces the probability that the adversary can bypass the redundant checks by introducing the same fault in the original and redundant computations. All claims have been validated via practical experiments on a SASEBO GII board.
Category / Keywords: secret-key cryptography / Cryptanalysis, Time Redundancy, Biased Faults, AES
Original Publication (with major differences): COSADE 2015
Date: received 12 Aug 2015
Contact author: sikharpatranabis at gmail com
Available format(s): PDF | BibTeX Citation
Version: 20150813:024532 (All versions of this report)
Short URL: ia.cr/2015/806
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]