Proceedings of the 38th Conference on Design Automation - DAC '01 2001
DOI: 10.1145/378239.379027
|View full text |Cite
|
Sign up to set email alerts
|

Concurrent error detection of fault-based side-channel cryptanalysis of 128-bit symmetric block ciphers

Abstract: Fault-based side channel cryptanalysis is very effective against symmetric and asymmetric encryption algorithms. Although straightforward hardware and time redundancy based concurrent error detection (CED) architectures can be used to thwart such attacks, they entail significant overhead (either area or performance). In this paper we investigate systematic approaches to low-cost, low-latency CED for symmetric encryption algorithms based on the inverse relationship that exists between encryption and decryption … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0
1

Year Published

2003
2003
2017
2017

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 41 publications
(22 citation statements)
references
References 15 publications
0
20
0
1
Order By: Relevance
“…AES에 대한 오류 주입 공격을 방어하는 방법들로 는 동시 오류 검출(CED) 방법 [11], 패리티 비트를 이용한 대응 방법 [12,13], S-Box의 입․출력 연관 성을 검사하는 방법 [14,15], CRC를 이용하는 방법 [16], 입․출력 차분 특성을 이용한 대응 방법 [17] ( …”
Section: 블록 암호 Aria에 대한 오류 주입 공격 대응 방안unclassified
“…AES에 대한 오류 주입 공격을 방어하는 방법들로 는 동시 오류 검출(CED) 방법 [11], 패리티 비트를 이용한 대응 방법 [12,13], S-Box의 입․출력 연관 성을 검사하는 방법 [14,15], CRC를 이용하는 방법 [16], 입․출력 차분 특성을 이용한 대응 방법 [17] ( …”
Section: 블록 암호 Aria에 대한 오류 주입 공격 대응 방안unclassified
“…al [14] developed a systematic CED approach for symmetric block ciphers at the register transfer level that exploits the inverse relationship between the encryption and decryption at the algorithm level, round level and individual operation level. They demonstrated this inverse-relationship principle on 128-bit symmetric block ciphers including Advanced Encryption Standard, RC6 and Serpent.…”
Section: Ced Architectures For Symmetric Block Ciphers: Backgroundmentioning
confidence: 99%
“…Also we can inject faults temporarily in the cryptographic system in reason to retrieve the secret key or state. Many error detection schemes have been implemented to make a robust hardware design and to secure cryptographic systems against faults injection attacks [12][13][14][15][16][17][18][19][20][21].…”
Section: Introductionmentioning
confidence: 99%