شماره ركورد كنفرانس :
3926
عنوان مقاله :
A Novel Countermeasure Against Fault Injection Attacks for AES-Based Cryptosystems
پديدآورندگان :
Mirzaeyan Ali mirzaeyan@comp.iust.ac.ir Dependable Systems and Architectures Laboratory, Department of Computer Engineering, Iran University of Science and Technology, Tehran, Iran , Patooghy Ahmad patooghy@iust.ac.ir Dependable Systems and Architectures Laboratory, Department of Computer Engineering, Iran University of Science and Technology, Tehran, Iran , Fazeli Mehdi fazeli@iust.ac.ir Dependable Systems and Architectures Laboratory, Department of Computer Engineering, Iran University of Science and Technology, Tehran, Iran
كليدواژه :
fault injection attack , Chinese Reminder Theorem , mixed radix system
عنوان كنفرانس :
بيست و چهارمين كنفرانس مهندسي برق ايران
چكيده فارسي :
Substitution function in AES-Based cryptosystems is highly vulnerable to different security attacks specially fault injection attacks. This paper proposes an architectural level method to immune AES-based cryptosystem against fault injection attacks. The proposed method utilizes extra substitution tables to detect maliciously injected fault. Values of the proposed substitution tables are stored in modulo 32, 15, 31, 16 which are derived based on Chinese Reminder Theorem. In this way, an 8bitvalueofeachcelloftraditionalsubstitutiontableisdistributed among at least two cells in the proposed substitution function. The proposed substitution architecture may be adapted with 2, 4, 6 SBox tables. As a case study, we have analyzed fault detection capability of the proposed substitution architecture when the traditional substitution table is replaced with four modulo tables i.e., 32, 15, 16, 31. Results show that all of one-bit injected faults, 93%oftwo-bitfaults,98%ofthreebitfaults,and97%offourbit faults can be detected by the proposed substitution architecture. These are achieved at the cost of 48% in occupied area and 96% in critical path delay.