2012
DOI: 10.1007/978-3-642-33481-8_17
|View full text |Cite
|
Sign up to set email alerts
|

Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output

Abstract: Abstract. Implementation attacks pose a serious threat for the security of cryptographic devices and there are a multitude of countermeasures that are used to prevent them. Two countermeasures used in implementations of block ciphers to increase the complexity of such attacks are the use of dummy rounds and redundant computation with consistency checks to prevent fault attacks. In this paper we present several countermeasures based on the idea of infective computation. Our countermeasures ensure that a fault i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
62
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 81 publications
(62 citation statements)
references
References 25 publications
0
62
0
Order By: Relevance
“…This attack can said to be successful when the attacker will be able to know the plaintext from the cipher text he knows. Mainly encryption key can be known with the help of this attack Morden cryptosystem are guarded against COA [15].…”
Section: Bitsmentioning
confidence: 99%
“…This attack can said to be successful when the attacker will be able to know the plaintext from the cipher text he knows. Mainly encryption key can be known with the help of this attack Morden cryptosystem are guarded against COA [15].…”
Section: Bitsmentioning
confidence: 99%
“…Recently Gierlichs et al [18] and then Tupsamudre et al [39] published an AES countermeasure that consists in infecting the result in the presence of fault in order to make it nonexploitable by an attacker.…”
Section: Introductionmentioning
confidence: 99%
“…However, deterministic diffusion-based infective countermeasures are vulnerable to attack as demonstrated by Lomné et al [8]. A random variation of the infective countermeasure was proposed by Gierlichs et al [9]. However, the infection method employed by this countermeasure has a number of shortcomings, as demonstrated by Battistello and Giraud [10], and in greater detail by Tupsamudre et al [11].…”
Section: Introductionmentioning
confidence: 99%
“…However, the infection method employed by this countermeasure has a number of shortcomings, as demonstrated by Battistello and Giraud [10], and in greater detail by Tupsamudre et al [11]. Tupsamudre et al have also proposed an improved infective countermeasure that avoids all the pitfalls of [9] and is claimed to thwart DFA.…”
Section: Introductionmentioning
confidence: 99%