Table Redundancy Method for Protecting Against Fault Attacks

Fault attacks (FA) intentionally inject some fault into the encryption process for analyzing a secret key based on faulty intermediate values or faulty ciphertexts. One of the easy ways for software-based countermeasures is to use time redundancy. However, existing methods can be broken by skipping...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE access 2021, Vol.9, p.92214-92223
Hauptverfasser: Lee, Seungkwang, Jho, Nam-Su, Kim, Myungchul
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 92223
container_issue
container_start_page 92214
container_title IEEE access
container_volume 9
creator Lee, Seungkwang
Jho, Nam-Su
Kim, Myungchul
description Fault attacks (FA) intentionally inject some fault into the encryption process for analyzing a secret key based on faulty intermediate values or faulty ciphertexts. One of the easy ways for software-based countermeasures is to use time redundancy. However, existing methods can be broken by skipping comparison operations or by using non-uniform distributions of faulty intermediate values. In this paper, we propose a secure software-based redundancy, aptly named table redundancy, applying different linear and nonlinear transformations to redundant computations of table-based block cipher structures. To reduce the table size and the number of lookups, some outer tables that are not subjected to FA are shared, while the inner tables are protected by table redundancy. The basic idea is that different transformations protecting redundant computations are correctly decoded if the redundant outcomes are combined without faulty values. In addition, this recombination provides infective computations because a faulty byte is likely to propagate its error to adjacent bytes due to the use of 32-bit linear transformations. Our method also presents a stateful feature in the connection with detected faults and subsequent plaintexts for preventing iterative fault injection. We demonstrate the protection of AES-128 against FA and show a negligible advantage of FA.
doi_str_mv 10.1109/ACCESS.2021.3092314
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_ACCESS_2021_3092314</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9465147</ieee_id><doaj_id>oai_doaj_org_article_9c5d6b1dda9e487a8962462ba7b94835</doaj_id><sourcerecordid>2547641038</sourcerecordid><originalsourceid>FETCH-LOGICAL-c408t-6e88148f8e365db91a64417d4c32e8a0fd18e1ab26deac48a7ec9d3608e42fb73</originalsourceid><addsrcrecordid>eNpNkE1Lw0AQhhdRUGp_QS8Bz6n7lc0ueCmhfoCiaD0vk91JTa3Zutke_PemRsS5zPDyvjPDQ8iM0Tlj1Fwuqmr58jLnlLO5oIYLJo_IGWfK5KIQ6vjffEqmfb-hQ-lBKsozcrWCeovZM_p956FzX9kDprfgsybE7CmGhC613TpbrKHt-pRdw36bskVK4N77c3LSwLbH6W-fkNfr5aq6ze8fb-6qxX3uJNUpV6g1k7rRKFTha8NASclKL53gqIE2nmlkUHPlEZzUUKIzXiiqUfKmLsWE3I17fYCN3cX2A-KXDdDaHyHEtYWYWrdFa1zhVc28B4NSl6CN4lLxGsraSD0wmJCLcdcuhs899sluwj52w_uWF7JUklGhB5cYXS6Gvo_Y_F1l1B6o25G6PVC3v9SH1GxMtYj4lzBSFUyW4htHnnxT</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2547641038</pqid></control><display><type>article</type><title>Table Redundancy Method for Protecting Against Fault Attacks</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Lee, Seungkwang ; Jho, Nam-Su ; Kim, Myungchul</creator><creatorcontrib>Lee, Seungkwang ; Jho, Nam-Su ; Kim, Myungchul</creatorcontrib><description>Fault attacks (FA) intentionally inject some fault into the encryption process for analyzing a secret key based on faulty intermediate values or faulty ciphertexts. One of the easy ways for software-based countermeasures is to use time redundancy. However, existing methods can be broken by skipping comparison operations or by using non-uniform distributions of faulty intermediate values. In this paper, we propose a secure software-based redundancy, aptly named table redundancy, applying different linear and nonlinear transformations to redundant computations of table-based block cipher structures. To reduce the table size and the number of lookups, some outer tables that are not subjected to FA are shared, while the inner tables are protected by table redundancy. The basic idea is that different transformations protecting redundant computations are correctly decoded if the redundant outcomes are combined without faulty values. In addition, this recombination provides infective computations because a faulty byte is likely to propagate its error to adjacent bytes due to the use of 32-bit linear transformations. Our method also presents a stateful feature in the connection with detected faults and subsequent plaintexts for preventing iterative fault injection. We demonstrate the protection of AES-128 against FA and show a negligible advantage of FA.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2021.3092314</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Algorithms ; block cipher ; Ciphers ; countermeasure ; Encoding ; Encryption ; fault attacks ; Fault detection ; Iterative methods ; Linear transformations ; Redundancy ; Software ; Software cryptography ; Table lookup</subject><ispartof>IEEE access, 2021, Vol.9, p.92214-92223</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c408t-6e88148f8e365db91a64417d4c32e8a0fd18e1ab26deac48a7ec9d3608e42fb73</citedby><cites>FETCH-LOGICAL-c408t-6e88148f8e365db91a64417d4c32e8a0fd18e1ab26deac48a7ec9d3608e42fb73</cites><orcidid>0000-0003-1721-5350 ; 0000-0001-9534-9624 ; 0000-0001-8077-0053</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9465147$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,864,2102,4024,27633,27923,27924,27925,54933</link.rule.ids></links><search><creatorcontrib>Lee, Seungkwang</creatorcontrib><creatorcontrib>Jho, Nam-Su</creatorcontrib><creatorcontrib>Kim, Myungchul</creatorcontrib><title>Table Redundancy Method for Protecting Against Fault Attacks</title><title>IEEE access</title><addtitle>Access</addtitle><description>Fault attacks (FA) intentionally inject some fault into the encryption process for analyzing a secret key based on faulty intermediate values or faulty ciphertexts. One of the easy ways for software-based countermeasures is to use time redundancy. However, existing methods can be broken by skipping comparison operations or by using non-uniform distributions of faulty intermediate values. In this paper, we propose a secure software-based redundancy, aptly named table redundancy, applying different linear and nonlinear transformations to redundant computations of table-based block cipher structures. To reduce the table size and the number of lookups, some outer tables that are not subjected to FA are shared, while the inner tables are protected by table redundancy. The basic idea is that different transformations protecting redundant computations are correctly decoded if the redundant outcomes are combined without faulty values. In addition, this recombination provides infective computations because a faulty byte is likely to propagate its error to adjacent bytes due to the use of 32-bit linear transformations. Our method also presents a stateful feature in the connection with detected faults and subsequent plaintexts for preventing iterative fault injection. We demonstrate the protection of AES-128 against FA and show a negligible advantage of FA.</description><subject>Algorithms</subject><subject>block cipher</subject><subject>Ciphers</subject><subject>countermeasure</subject><subject>Encoding</subject><subject>Encryption</subject><subject>fault attacks</subject><subject>Fault detection</subject><subject>Iterative methods</subject><subject>Linear transformations</subject><subject>Redundancy</subject><subject>Software</subject><subject>Software cryptography</subject><subject>Table lookup</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNkE1Lw0AQhhdRUGp_QS8Bz6n7lc0ueCmhfoCiaD0vk91JTa3Zutke_PemRsS5zPDyvjPDQ8iM0Tlj1Fwuqmr58jLnlLO5oIYLJo_IGWfK5KIQ6vjffEqmfb-hQ-lBKsozcrWCeovZM_p956FzX9kDprfgsybE7CmGhC613TpbrKHt-pRdw36bskVK4N77c3LSwLbH6W-fkNfr5aq6ze8fb-6qxX3uJNUpV6g1k7rRKFTha8NASclKL53gqIE2nmlkUHPlEZzUUKIzXiiqUfKmLsWE3I17fYCN3cX2A-KXDdDaHyHEtYWYWrdFa1zhVc28B4NSl6CN4lLxGsraSD0wmJCLcdcuhs899sluwj52w_uWF7JUklGhB5cYXS6Gvo_Y_F1l1B6o25G6PVC3v9SH1GxMtYj4lzBSFUyW4htHnnxT</recordid><startdate>2021</startdate><enddate>2021</enddate><creator>Lee, Seungkwang</creator><creator>Jho, Nam-Su</creator><creator>Kim, Myungchul</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0003-1721-5350</orcidid><orcidid>https://orcid.org/0000-0001-9534-9624</orcidid><orcidid>https://orcid.org/0000-0001-8077-0053</orcidid></search><sort><creationdate>2021</creationdate><title>Table Redundancy Method for Protecting Against Fault Attacks</title><author>Lee, Seungkwang ; Jho, Nam-Su ; Kim, Myungchul</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c408t-6e88148f8e365db91a64417d4c32e8a0fd18e1ab26deac48a7ec9d3608e42fb73</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>block cipher</topic><topic>Ciphers</topic><topic>countermeasure</topic><topic>Encoding</topic><topic>Encryption</topic><topic>fault attacks</topic><topic>Fault detection</topic><topic>Iterative methods</topic><topic>Linear transformations</topic><topic>Redundancy</topic><topic>Software</topic><topic>Software cryptography</topic><topic>Table lookup</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lee, Seungkwang</creatorcontrib><creatorcontrib>Jho, Nam-Su</creatorcontrib><creatorcontrib>Kim, Myungchul</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lee, Seungkwang</au><au>Jho, Nam-Su</au><au>Kim, Myungchul</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Table Redundancy Method for Protecting Against Fault Attacks</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2021</date><risdate>2021</risdate><volume>9</volume><spage>92214</spage><epage>92223</epage><pages>92214-92223</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Fault attacks (FA) intentionally inject some fault into the encryption process for analyzing a secret key based on faulty intermediate values or faulty ciphertexts. One of the easy ways for software-based countermeasures is to use time redundancy. However, existing methods can be broken by skipping comparison operations or by using non-uniform distributions of faulty intermediate values. In this paper, we propose a secure software-based redundancy, aptly named table redundancy, applying different linear and nonlinear transformations to redundant computations of table-based block cipher structures. To reduce the table size and the number of lookups, some outer tables that are not subjected to FA are shared, while the inner tables are protected by table redundancy. The basic idea is that different transformations protecting redundant computations are correctly decoded if the redundant outcomes are combined without faulty values. In addition, this recombination provides infective computations because a faulty byte is likely to propagate its error to adjacent bytes due to the use of 32-bit linear transformations. Our method also presents a stateful feature in the connection with detected faults and subsequent plaintexts for preventing iterative fault injection. We demonstrate the protection of AES-128 against FA and show a negligible advantage of FA.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2021.3092314</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0003-1721-5350</orcidid><orcidid>https://orcid.org/0000-0001-9534-9624</orcidid><orcidid>https://orcid.org/0000-0001-8077-0053</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2021, Vol.9, p.92214-92223
issn 2169-3536
2169-3536
language eng
recordid cdi_crossref_primary_10_1109_ACCESS_2021_3092314
source IEEE Open Access Journals; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Algorithms
block cipher
Ciphers
countermeasure
Encoding
Encryption
fault attacks
Fault detection
Iterative methods
Linear transformations
Redundancy
Software
Software cryptography
Table lookup
title Table Redundancy Method for Protecting Against Fault Attacks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T18%3A08%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Table%20Redundancy%20Method%20for%20Protecting%20Against%20Fault%20Attacks&rft.jtitle=IEEE%20access&rft.au=Lee,%20Seungkwang&rft.date=2021&rft.volume=9&rft.spage=92214&rft.epage=92223&rft.pages=92214-92223&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2021.3092314&rft_dat=%3Cproquest_cross%3E2547641038%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2547641038&rft_id=info:pmid/&rft_ieee_id=9465147&rft_doaj_id=oai_doaj_org_article_9c5d6b1dda9e487a8962462ba7b94835&rfr_iscdi=true