Paper 2017/910
Thwarting Fault Attacks using the Internal Redundancy Countermeasure (IRC)
Benjamin Lac, Anne Canteaut, Jacques J. A. Fournier, and Renaud Sirdey
Abstract
A growing number of connected objects, with their high performance and low-resources constraints, are embedding lightweight ciphers for protecting the confidentiality of the data they manipulate or store. Since those objects are easily accessible, they are prone to a whole range of physical attacks, one of which are fault attacks against for which countermeasures are usually expensive to implement, especially on off-the-shelf devices. For such devices, we propose a new generic software countermeasure, called the Internal Redundancy Countermeasure (IRC), to thwart most fault attacks while preserving the performances of the targeted cipher. We report practical experiments showing that IRC successfully thwarts fault attacks on the block cipher PRIDE and on the stream cipher TRIVIUM for which we protect both the initialization and the keystream generation.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Preprint. MINOR revision.
- Keywords
- IRCPhysical attacksFault attacksSIMD instructionsSoftware countermeasureLightweight cryptographyIoT.
- Contact author(s)
- benjamin lac @ cea fr
- History
- 2017-09-24: received
- Short URL
- https://ia.cr/2017/910
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2017/910, author = {Benjamin Lac and Anne Canteaut and Jacques J. A. Fournier and Renaud Sirdey}, title = {Thwarting Fault Attacks using the Internal Redundancy Countermeasure ({IRC})}, howpublished = {Cryptology {ePrint} Archive, Paper 2017/910}, year = {2017}, url = {https://eprint.iacr.org/2017/910} }