On evaluating fault resilient encoding schemes in software

Cryptographic implementations are often vulnerable against physical attacks, fault injection analysis being among the most popular techniques. On par with development of attacks, the area of countermeasures is advancing rapidly, utilizing both hardware- and software-based approaches. When it comes t...

Full description

Bibliographic Details
Main Authors: Breier, Jakub, Hou, Xiaolu, Liu, Yang
Other Authors: School of Computer Science and Engineering
Format: Journal Article
Language:English
Published: 2021
Subjects:
Online Access:https://hdl.handle.net/10356/151844
_version_ 1811679458644459520
author Breier, Jakub
Hou, Xiaolu
Liu, Yang
author2 School of Computer Science and Engineering
author_facet School of Computer Science and Engineering
Breier, Jakub
Hou, Xiaolu
Liu, Yang
author_sort Breier, Jakub
collection NTU
description Cryptographic implementations are often vulnerable against physical attacks, fault injection analysis being among the most popular techniques. On par with development of attacks, the area of countermeasures is advancing rapidly, utilizing both hardware- and software-based approaches. When it comes to software encoding countermeasures for fault protection and their evaluation, there are very few proposals so far, mostly focusing on single operations rather than cipher as a whole. In this paper we propose an evaluation framework that can be used for analyzing the effectivity of software encoding countermeasures against fault attacks. We first formalize the encoding schemes in software, helping us to define what properties are required when designing a fault protection. Based on these findings, we develop evaluation metric that can be used universally to determine the robustness of a software encoding scheme against bit flip faults and instruction skips. We provide a way to select a code according to user criteria and also a dynamic code analysis method to estimate the level of protection of assembly implementations using encoding schemes. Finally, we verify our findings by implementing a block cipher PRESENT, protected by encoding scheme based on anticodes, and provide a detailed evaluation of this implementation using different codes.
first_indexed 2024-10-01T03:09:29Z
format Journal Article
id ntu-10356/151844
institution Nanyang Technological University
language English
last_indexed 2024-10-01T03:09:29Z
publishDate 2021
record_format dspace
spelling ntu-10356/1518442021-07-05T02:54:34Z On evaluating fault resilient encoding schemes in software Breier, Jakub Hou, Xiaolu Liu, Yang School of Computer Science and Engineering Engineering::Computer science and engineering::Data::Data encryption Fault Injection Attacks Encoding Schemes Cryptographic implementations are often vulnerable against physical attacks, fault injection analysis being among the most popular techniques. On par with development of attacks, the area of countermeasures is advancing rapidly, utilizing both hardware- and software-based approaches. When it comes to software encoding countermeasures for fault protection and their evaluation, there are very few proposals so far, mostly focusing on single operations rather than cipher as a whole. In this paper we propose an evaluation framework that can be used for analyzing the effectivity of software encoding countermeasures against fault attacks. We first formalize the encoding schemes in software, helping us to define what properties are required when designing a fault protection. Based on these findings, we develop evaluation metric that can be used universally to determine the robustness of a software encoding scheme against bit flip faults and instruction skips. We provide a way to select a code according to user criteria and also a dynamic code analysis method to estimate the level of protection of assembly implementations using encoding schemes. Finally, we verify our findings by implementing a block cipher PRESENT, protected by encoding scheme based on anticodes, and provide a detailed evaluation of this implementation using different codes. Accepted version 2021-07-05T02:07:47Z 2021-07-05T02:07:47Z 2021 Journal Article Breier, J., Hou, X. & Liu, Y. (2021). On evaluating fault resilient encoding schemes in software. IEEE Transactions On Dependable and Secure Computing, 18(3), 1065-1079. https://dx.doi.org/10.1109/TDSC.2019.2897663 1545-5971 https://hdl.handle.net/10356/151844 10.1109/TDSC.2019.2897663 2-s2.0-85061271660 3 18 1065 1079 en IEEE Transactions on Dependable and Secure Computing © 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/TDSC.2019.2897663 application/pdf
spellingShingle Engineering::Computer science and engineering::Data::Data encryption
Fault Injection Attacks
Encoding Schemes
Breier, Jakub
Hou, Xiaolu
Liu, Yang
On evaluating fault resilient encoding schemes in software
title On evaluating fault resilient encoding schemes in software
title_full On evaluating fault resilient encoding schemes in software
title_fullStr On evaluating fault resilient encoding schemes in software
title_full_unstemmed On evaluating fault resilient encoding schemes in software
title_short On evaluating fault resilient encoding schemes in software
title_sort on evaluating fault resilient encoding schemes in software
topic Engineering::Computer science and engineering::Data::Data encryption
Fault Injection Attacks
Encoding Schemes
url https://hdl.handle.net/10356/151844
work_keys_str_mv AT breierjakub onevaluatingfaultresilientencodingschemesinsoftware
AT houxiaolu onevaluatingfaultresilientencodingschemesinsoftware
AT liuyang onevaluatingfaultresilientencodingschemesinsoftware