scispace - formally typeset
Journal ArticleDOI

An Operation-Centered Approach to Fault Detection in Symmetric Cryptography Ciphers

TLDR
A general framework for error detection in symmetric ciphers based on an operation-centered approach is proposed and recommended based on the arithmetic and logic operations included in the cipher and the efficacy and hardware complexity of several error-detecting codes for each such operation.
Abstract
One of the most effective ways of attacking a cryptographic device is by deliberate fault injection during computation, which allows retrieving the secret key with a small number of attempts. Several attacks on symmetric and public-key cryptosystems have been described in the literature and some dedicated error-detection techniques have been proposed to foil them. The proposed techniques are ad hoc ones and exploit specific properties of the cryptographic algorithms. In this paper, we propose a general framework for error detection in symmetric ciphers based on an operation-centered approach. We first enumerate the arithmetic and logic operations included in the cipher and analyze the efficacy and hardware complexity of several error-detecting codes for each such operation. We then recommend an error-detecting code for the cipher as a whole based on the operations it employs. We also deal with the trade-off between the frequency of checking for errors and the error coverage. We demonstrate our framework on a representative group of 11 symmetric ciphers. Our conclusions are supported by both analytical proofs and extensive simulation experiments

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

A comparative survey of Symmetric and Asymmetric Key Cryptography

TL;DR: The traditional algorithms, along with the proposed algorithms based on their pros and cons, related to Symmetric and Asymmetric Key Cryptography are surveyed and the importance of both these cryptographic techniques is compared.
Journal ArticleDOI

Concurrent Structure-Independent Fault Detection Schemes for the Advanced Encryption Standard

TL;DR: This paper proposes low-cost structure-independent fault detection schemes for the AES encryption and decryption using new formulations for the fault detection of SubBytes and inverse SubBytes using the relation between the input and the output of the S-box and the inverse S-boxes.

Parity-based concurrent error detection of substitution-permutation network block ciphers

TL;DR: In this paper, the parity code based concurrent error detection (CED) approach against such attacks in substitution-permutation network (SPN) symmetric block ciphers is described.
Journal ArticleDOI

A Lightweight High-Performance Fault Detection Scheme for the Advanced Encryption Standard Using Composite Fields

TL;DR: This paper presents a lightweight concurrent fault detection scheme for the AES, and shows that both the application-specific integrated circuit and field-programmable gate-array implementations of the fault detection structures using the obtained optimum composite fields, have better hardware and time complexities compared to their counterparts.
Journal ArticleDOI

Security analysis of concurrent error detection against differential fault analysis

TL;DR: This work provides a systematic study of DFA of AES and shows that an attacker can inject biased faults to improve the success rate of the attacks and proposes fault entropy (FE) and fault differential entropy (FDE) to evaluate CEDs.
References
More filters
Journal ArticleDOI

Error-correcting codes

Journal Article

Data encryption standard

TL;DR: Presentation de la norme americaine de codage des donnees informatisees (DES: Data Encryption Standard) permet de proteger lesDonnees selon des criteres qui sont developpes dans ce texte.
Book

Computer Arithmetic Algorithms

TL;DR: The principles of the algorithms available for performing arithmetic operations in digital computers, described independently of specific implementation technology and within the same framework, are explained.
Book ChapterDOI

The RC5 encryption algorithm

TL;DR: This document describes the RC5 encryption algorithm, a fast symmetric block cipher suitable for hardware or software implementations and a novel feature of RC5 is the heavy use of data-dependent rotations.
Book ChapterDOI

Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)

TL;DR: Blowfish, a new secret-key block cipher, is proposed, a Feistel network, iterating a simple encryption function 16 times, which is very efficient on large microprocessors.
Related Papers (5)