You are looking at a specific version 20190622:150536 of this paper. See the latest version.

Paper 2019/355

To Infect Or Not To Infect: A Critical Analysis Of Infective Countermeasures In Fault Attacks

Anubhab Baksi and Dhiman Saha and Sumanta Sarkar

Abstract

As fault based cryptanalysis is becoming more and more of a practical threat, it is imperative to make efforts to devise suitable countermeasures. In this regard, the so-called ``infective countermeasures'' have garnered particular attention from the community due to their ability in inhibiting differential fault attacks without explicitly detecting the fault. We observe that despite being adopted over a decade ago, a systematic study of infective countermeasures is missing from the literature. Moreover, there seems to be a lack of proper security analysis of the schemes proposed, as quite a few of them have been broken promptly. Our first contribution comes in the form of a generalization of infective schemes which aids us with a better insight into the vulnerabilities, scopes for cost reduction and possible improvements. This way, we are able to propose lightweight alternatives of two existing schemes, propose new design based on already established standards, analyze a security claim made by a scheme proposed in CHES'14 and re-instantiate another scheme which is deemed broken by proposing a simple patch.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint.
Keywords
fault countermeasureinfectiondifferential fault analysis
Contact author(s)
ANUBHAB001 @ E NTU EDU SG
History
2020-05-31: last of 11 revisions
2019-04-07: received
See all versions
Short URL
https://ia.cr/2019/355
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.