Cryptology ePrint Archive: Report 2016/648
ParTI -- Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks
Tobias Schneider and Amir Moradi and Tim GŁneysu
Abstract: Side-channel analysis and fault-injection attacks are known as major threats to any cryptographic implementation.
Hardening cryptographic implementations with appropriate countermeasures is thus essential before they are deployed in the wild.
However, countermeasures for both threats are of completely different nature: Side-channel analysis is mitigated by techniques that hide or mask key-dependent information while resistance against fault-injection attacks can be achieved by redundancy in the computation for immediate error detection. Since already the integration of any single countermeasure in cryptographic hardware comes with significant costs in terms of performance and area, a combination of multiple countermeasures is expensive and often associated with undesired side effects.
In this work, we introduce a countermeasure for cryptographic hardware implementations that combines the concept of a provably-secure masking scheme (i.e., threshold implementation) with an error detecting approach against fault injection.
As a case study, we apply our generic construction to the lightweight LED cipher. Our LED instance achieves first-order resistance against side-channel attacks combined with a fault detection capability that is superior to that of simple duplication for most error distributions at an increased area demand of 12%.
Category / Keywords: implementation / side-channel analysis, fault injection, countermeasure, threshold implementation, error detecting code
Original Publication (with major differences): IACR-CRYPTO-2016
Date: received 22 Jun 2016
Contact author: tobias schneider-a7a at rub de
Available format(s): PDF | BibTeX Citation
Version: 20160624:202647 (All versions of this report)
Short URL: ia.cr/2016/648
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]