Paper 2017/910

Thwarting Fault Attacks using the Internal Redundancy Countermeasure (IRC)

Benjamin Lac, Anne Canteaut, Jacques J. A. Fournier, and Renaud Sirdey

Abstract

A growing number of connected objects, with their high performance and low-resources constraints, are embedding lightweight ciphers for protecting the confidentiality of the data they manipulate or store. Since those objects are easily accessible, they are prone to a whole range of physical attacks, one of which are fault attacks against for which countermeasures are usually expensive to implement, especially on off-the-shelf devices. For such devices, we propose a new generic software countermeasure, called the Internal Redundancy Countermeasure (IRC), to thwart most fault attacks while preserving the performances of the targeted cipher. We report practical experiments showing that IRC successfully thwarts fault attacks on the block cipher PRIDE and on the stream cipher TRIVIUM for which we protect both the initialization and the keystream generation.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint. MINOR revision.
Keywords
IRCPhysical attacksFault attacksSIMD instructionsSoftware countermeasureLightweight cryptographyIoT.
Contact author(s)
benjamin lac @ cea fr
History
2017-09-24: received
Short URL
https://ia.cr/2017/910
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2017/910,
      author = {Benjamin Lac and Anne Canteaut and Jacques J. A.  Fournier and Renaud Sirdey},
      title = {Thwarting Fault Attacks using the Internal Redundancy Countermeasure (IRC)},
      howpublished = {Cryptology ePrint Archive, Paper 2017/910},
      year = {2017},
      note = {\url{https://eprint.iacr.org/2017/910}},
      url = {https://eprint.iacr.org/2017/910}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.