Paper 2020/250

On a Side Channel and Fault Attack Concurrent Countermeasure Methodology for MCU-based Byte-sliced Cipher Implementations

Ehsan Aerabi, Athanasios Papadimitriou, and David Hely

Abstract

As IoT applications are increasingly being deployed, there comes along an ever increasing need for the security and privacy of the involved data. Since cryptographic implementations are used to achieve these goals, it is important for embedded software developers to take into consideration hardware attacks. Side Channel Analysis (SCA) and Fault Attacks (FA) are the main classes of such attacks, which can either reduce or even eliminate the security levels of an em-bedded design. Therefore, cryptographic implementations must address both of them at the same time. To this end, multiple solutions have been proposed to address both attacks in one solution, such as Dual Pre-charge Logic (DPL) and Encoding countermeasures. In this work, we discuss the advantages and disadvantages of the state of the art, concurrent SCA and FA countermeasures. Additionally, we propose a software countermeasure in order to provide protection against both types of attacks. The proposed countermeasure is a general approach, applicable to any byte-sliced cipher and any modern MCUs (32- and 64-bit). The proposed countermeasure is ap-plied to an AES S-BOX implementation, for a 32-bit MCU (ARM Cortex-M3). The countermeasure has been experimen-tally evaluated against Correlation Power Analysis (CPA) attacks for both platforms while its fault detection capabilities are theoretically described.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Minor revision. 2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS)
Keywords
Hardware securitySide channel attacksFault attacksCountermeasureAESbyte-sliced ciphers
Contact author(s)
ehsan aerabi @ lcis grenoble-inp fr
History
2020-02-26: revised
2020-02-25: received
See all versions
Short URL
https://ia.cr/2020/250
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2020/250,
      author = {Ehsan Aerabi and Athanasios Papadimitriou and David Hely},
      title = {On a Side Channel and Fault Attack Concurrent Countermeasure Methodology for {MCU}-based Byte-sliced Cipher Implementations},
      howpublished = {Cryptology {ePrint} Archive, Paper 2020/250},
      year = {2020},
      url = {https://eprint.iacr.org/2020/250}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.