Cryptology ePrint Archive: Report 2019/1369

Impeccable Circuits II

Aein Rezaei Shahmirzadi and Shahram Rasoolzadeh and Amir Moradi

Abstract: Protection against active physical attacks is of serious concerns of cryptographic hardware designers. Introduction of SIFA invalidating several previously-thought-effective countermeasures, made this challenge even harder. Here in this work we deal with error correction, and introduce a methodology which shows, depending on the selected adversary model, how to correctly embed error-correcting codes in a cryptographic implementation. Our construction guarantees the correction of faults, in any location of the circuit and at any clock cycle, as long as they fit into the underlying adversary model. Based on case studies evaluated by open-source fault diagnostic tools, we claim protection against SIFA.

Category / Keywords: implementation / fault-injection attack, SIFA, error correction

Original Publication (in the same form): De­sign Au­to­ma­ti­on Con­fe­rence, DAC 2020

Date: received 27 Nov 2019, last revised 2 Apr 2020

Contact author: amir moradi at rub de

Available format(s): PDF | BibTeX Citation

Version: 20200402:132939 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]