Defeating with fault injection a combined attack resistant exponentiation

COSADE'13 Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design(2013)

引用 10|浏览0
暂无评分
摘要
Since the introduction of the side-channel and fault injection analysis late in the 90's, implementing cryptographic standards on embedded devices has become a difficult challenge. Developers were obliged to add new appropriate countermeasures into their code. To prevent those separate threats, they often implemented countermeasures separately. The side-channel dedicated countermeasures were added to the algorithm when on the other hand specific protections against fault injections, like computation verifications, were implemented. However in 2007 Amiel et al.demonstrated that a single fault injection combined with simple side-channel analysis can defeat such a classical implementation. Then it became obvious that side-channel and fault countermeasures had to be designed together. In that vein Schmidt et al.published at Latincrypt 2010 an efficient exponentiation algorithm supposedly resistant against this combined attack category. Despite the clever design of these algorithms, we present here two new attacks that can defeat its security. Our first attack is a single fault injection scheme requiring only few faulted ciphertexts. The second one requires the combination of a single fault injection with a differential treatment. We also propose a more secure version of this algorithm that thwarts our attacks.
更多
查看译文
关键词
single fault injection scheme,fault injection analysis,fault injection,combined attack category,side-channel dedicated countermeasures,new appropriate countermeasures,simple side-channel analysis,fault countermeasures,resistant exponentiation,efficient exponentiation algorithm,single fault injection
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要