scispace - formally typeset
Journal ArticleDOI

Error analysis and detection procedures for a hardware implementation of the advanced encryption standard

TLDR
Two fault detection schemes are presented: the first is a redundancy-based scheme while the second uses an error detecting code, which is a novel scheme which leads to very efficient and high coverage fault detection.
Abstract
The goal of the Advanced Encryption Standard (AES) is to achieve secure communication. The use of AES does not, however, guarantee reliable communication. Prior work has shown that even a single transient error occurring during the AES encryption (or decryption) process will very likely result in a large number of errors in the encrypted/decrypted data. Such faults must be detected before sending to avoid the transmission and use of erroneous data. Concurrent fault detection is important not only to protect the encryption/decryption process from random faults. It will also protect the encryption/decryption circuitry from an attacker who may maliciously inject faults in order to find the encryption secret key. In this paper, we first describe some studies of the effects that faults may have on a hardware implementation of AES by analyzing the propagation of such faults to the outputs. We then present two fault detection schemes: The first is a redundancy-based scheme while the second uses an error detecting code. The latter is a novel scheme which leads to very efficient and high coverage fault detection. Finally, the hardware costs and detection latencies of both schemes are estimated.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures

TL;DR: A comprehensive description of fault injection attacks on cryptographic devices and the countermeasures that have been developed against them and a discussion on the interaction between fault injections and the corresponding countermeasures and power analysis attacks.
BookDOI

Fault Analysis in Cryptography

TL;DR: This book deals with side-channel analysis and its relevance to fault attacks, which is the first book on this topic and will be of interest to researchers and practitioners engaged with cryptographic engineering.
Proceedings ArticleDOI

Robust protection against fault-injection attacks on smart cards implementing the advanced encryption standard

TL;DR: A method of protecting a hardware implementation of the advanced encryption standard (AES) against a side-channel attack known as differential fault analysis attack using systematic nonlinear (cubic) robust error detecting codes.
Journal ArticleDOI

Hardware Designer's Guide to Fault Attacks

TL;DR: An insight into the field of fault attacks and countermeasures to help the designer to protect the design against this type of implementation attacks and a guide for selecting a set of countermeasures, which provides a sufficient security level to meet the constraints of the embedded devices.
Journal ArticleDOI

Simple error detection methods for hardware implementation of Advanced Encryption Standard

TL;DR: In order to prevent the Advanced Encryption Standard (AES) from suffering from differential fault attacks, the technique of error detection can be adopted to detect the errors during encryption or decryption and then to provide the information for taking further action, such as interrupting the AES process or redoing the process.
References
More filters
MonographDOI

Introduction to finite fields and their applications

TL;DR: An introduction to the theory of finite fields, with emphasis on those aspects that are relevant for applications, especially information theory, algebraic coding theory and cryptology and a chapter on applications within mathematics, such as finite geometries.
Journal Article

Data encryption standard

TL;DR: Presentation de la norme americaine de codage des donnees informatisees (DES: Data Encryption Standard) permet de proteger lesDonnees selon des criteres qui sont developpes dans ce texte.
Journal ArticleDOI

The advanced encryption standard

TL;DR: The Advanced Encryption Standard (AES), which has been approved after an international competition by the National Institute of Standards and Technology, is described.
Book ChapterDOI

An Implementation of DES and AES, Secure against Some Attacks

TL;DR: This paper introduces some transformed S-boxes for DES and a new masking method and its applications to the non-linear part of Rijndael and applies this method to protect two of the most popular block ciphers: DES and the AES RIJndael.
Book ChapterDOI

A Fast New DES Implementation in Software

TL;DR: A new optimized standard implementation of DES on 64-bit processors is described, which is about twice faster than the fastest known standard DES implementation on the same processor.
Related Papers (5)