On evaluating fault resilient encoding schemes in software
Cryptographic implementations are often vulnerable against physical attacks, fault injection analysis being among the most popular techniques. On par with development of attacks, the area of countermeasures is advancing rapidly, utilizing both hardware- and software-based approaches. When it comes t...
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Journal Article |
Language: | English |
Published: |
2021
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/151844 |
_version_ | 1811679458644459520 |
---|---|
author | Breier, Jakub Hou, Xiaolu Liu, Yang |
author2 | School of Computer Science and Engineering |
author_facet | School of Computer Science and Engineering Breier, Jakub Hou, Xiaolu Liu, Yang |
author_sort | Breier, Jakub |
collection | NTU |
description | Cryptographic implementations are often vulnerable against physical attacks, fault injection analysis being among the most popular techniques. On par with development of attacks, the area of countermeasures is advancing rapidly, utilizing both hardware- and software-based approaches. When it comes to software encoding countermeasures for fault protection and their evaluation, there are very few proposals so far, mostly focusing on single operations rather than cipher as a whole. In this paper we propose an evaluation framework that can be used for analyzing the effectivity of software encoding countermeasures against fault attacks. We first formalize the encoding schemes in software, helping us to define what properties are required when designing a fault protection. Based on these findings, we develop evaluation metric that can be used universally to determine the robustness of a software encoding scheme against bit flip faults and instruction skips. We provide a way to select a code according to user criteria and also a dynamic code analysis method to estimate the level of protection of assembly implementations using encoding schemes. Finally, we verify our findings by implementing a block cipher PRESENT, protected by encoding scheme based on anticodes, and provide a detailed evaluation of this implementation using different codes. |
first_indexed | 2024-10-01T03:09:29Z |
format | Journal Article |
id | ntu-10356/151844 |
institution | Nanyang Technological University |
language | English |
last_indexed | 2024-10-01T03:09:29Z |
publishDate | 2021 |
record_format | dspace |
spelling | ntu-10356/1518442021-07-05T02:54:34Z On evaluating fault resilient encoding schemes in software Breier, Jakub Hou, Xiaolu Liu, Yang School of Computer Science and Engineering Engineering::Computer science and engineering::Data::Data encryption Fault Injection Attacks Encoding Schemes Cryptographic implementations are often vulnerable against physical attacks, fault injection analysis being among the most popular techniques. On par with development of attacks, the area of countermeasures is advancing rapidly, utilizing both hardware- and software-based approaches. When it comes to software encoding countermeasures for fault protection and their evaluation, there are very few proposals so far, mostly focusing on single operations rather than cipher as a whole. In this paper we propose an evaluation framework that can be used for analyzing the effectivity of software encoding countermeasures against fault attacks. We first formalize the encoding schemes in software, helping us to define what properties are required when designing a fault protection. Based on these findings, we develop evaluation metric that can be used universally to determine the robustness of a software encoding scheme against bit flip faults and instruction skips. We provide a way to select a code according to user criteria and also a dynamic code analysis method to estimate the level of protection of assembly implementations using encoding schemes. Finally, we verify our findings by implementing a block cipher PRESENT, protected by encoding scheme based on anticodes, and provide a detailed evaluation of this implementation using different codes. Accepted version 2021-07-05T02:07:47Z 2021-07-05T02:07:47Z 2021 Journal Article Breier, J., Hou, X. & Liu, Y. (2021). On evaluating fault resilient encoding schemes in software. IEEE Transactions On Dependable and Secure Computing, 18(3), 1065-1079. https://dx.doi.org/10.1109/TDSC.2019.2897663 1545-5971 https://hdl.handle.net/10356/151844 10.1109/TDSC.2019.2897663 2-s2.0-85061271660 3 18 1065 1079 en IEEE Transactions on Dependable and Secure Computing © 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/TDSC.2019.2897663 application/pdf |
spellingShingle | Engineering::Computer science and engineering::Data::Data encryption Fault Injection Attacks Encoding Schemes Breier, Jakub Hou, Xiaolu Liu, Yang On evaluating fault resilient encoding schemes in software |
title | On evaluating fault resilient encoding schemes in software |
title_full | On evaluating fault resilient encoding schemes in software |
title_fullStr | On evaluating fault resilient encoding schemes in software |
title_full_unstemmed | On evaluating fault resilient encoding schemes in software |
title_short | On evaluating fault resilient encoding schemes in software |
title_sort | on evaluating fault resilient encoding schemes in software |
topic | Engineering::Computer science and engineering::Data::Data encryption Fault Injection Attacks Encoding Schemes |
url | https://hdl.handle.net/10356/151844 |
work_keys_str_mv | AT breierjakub onevaluatingfaultresilientencodingschemesinsoftware AT houxiaolu onevaluatingfaultresilientencodingschemesinsoftware AT liuyang onevaluatingfaultresilientencodingschemesinsoftware |