### ParTI -- Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks

Tobias Schneider, Amir Moradi, and Tim Güneysu

##### Abstract

Side-channel analysis and fault-injection attacks are known as major threats to any cryptographic implementation. Hardening cryptographic implementations with appropriate countermeasures is thus essential before they are deployed in the wild. However, countermeasures for both threats are of completely different nature: Side-channel analysis is mitigated by techniques that hide or mask key-dependent information while resistance against fault-injection attacks can be achieved by redundancy in the computation for immediate error detection. Since already the integration of any single countermeasure in cryptographic hardware comes with significant costs in terms of performance and area, a combination of multiple countermeasures is expensive and often associated with undesired side effects. In this work, we introduce a countermeasure for cryptographic hardware implementations that combines the concept of a provably-secure masking scheme (i.e., threshold implementation) with an error detecting approach against fault injection. As a case study, we apply our generic construction to the lightweight LED cipher. Our LED instance achieves first-order resistance against side-channel attacks combined with a fault detection capability that is superior to that of simple duplication for most error distributions at an increased area demand of 12%.

##### Metadata
Available format(s)
Category
Implementation
Publication info
A major revision of an IACR publication in CRYPTO 2016
Keywords
side-channel analysisfault injectioncountermeasurethreshold implementationerror detecting code
Contact author(s)
tobias schneider-a7a @ rub de
History
2016-06-24: received
Short URL
https://ia.cr/2016/648
License

CC BY

BibTeX

@misc{cryptoeprint:2016/648,
author = {Tobias Schneider and Amir Moradi and Tim Güneysu},
title = {ParTI -- Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks},
howpublished = {Cryptology ePrint Archive, Paper 2016/648},
year = {2016},
note = {\url{https://eprint.iacr.org/2016/648}},
url = {https://eprint.iacr.org/2016/648}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.