Cryptology ePrint Archive: Report 2018/729

Towards Lightweight Cryptographic Primitives with Built-in Fault-Detection

Thierry Simon and Lejla Batina and Joan Daemen and Vincent Grosso and Pedro Maat Costa Massolino and Kostas Papagiannopoulos and Francesco Regazzoni and Niels Samwel

Abstract: We introduce a novel approach for designing symmetric ciphers to resist fault injection. The approach is fairly generic and applies to round functions of block ciphers, cryptographic permutations and stream ciphers. We showcase our method with a new permutation called FRIT and perform fault analysis on a simulated hardware and actual software implementation. We present performance results for software and hardware implementations with and without the fault detection mechanism. On a Cortex-M4 platform the overhead of the countermeasure in cycles is 83%. The penalty on resources for hardware implementations depends on the hardware and can be as low as 56%.

Category / Keywords: secret-key cryptography / design of cryptographic primitives, fault injection countermeasures, side-channel attack, lightweight implementations

Date: received 7 Aug 2018

Contact author: thierry simon 13 at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20180809:150830 (All versions of this report)

Short URL: ia.cr/2018/729

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]