Title :
An Operation-Centered Approach to Fault Detection in Symmetric Cryptography Ciphers
Author :
Breveglieri, Luca ; Koren, Israel ; Maistri, Paolo
Author_Institution :
Dept. of Electron. & Inf. Technol., Politecnico di Milano, Milan
fDate :
5/1/2007 12:00:00 AM
Abstract :
One of the most effective ways of attacking a cryptographic device is by deliberate fault injection during computation, which allows retrieving the secret key with a small number of attempts. Several attacks on symmetric and public-key cryptosystems have been described in the literature and some dedicated error-detection techniques have been proposed to foil them. The proposed techniques are ad hoc ones and exploit specific properties of the cryptographic algorithms. In this paper, we propose a general framework for error detection in symmetric ciphers based on an operation-centered approach. We first enumerate the arithmetic and logic operations included in the cipher and analyze the efficacy and hardware complexity of several error-detecting codes for each such operation. We then recommend an error-detecting code for the cipher as a whole based on the operations it employs. We also deal with the trade-off between the frequency of checking for errors and the error coverage. We demonstrate our framework on a representative group of 11 symmetric ciphers. Our conclusions are supported by both analytical proofs and extensive simulation experiments
Keywords :
computational complexity; error detection; error detection codes; fault diagnosis; public key cryptography; arithmetic operations; error-detection technique; fault detection; fault injection; logic operations; operation-centered approach; public-key cryptosystems; secret key retrieval; symmetric ciphers; symmetric cryptography ciphers; symmetric key; Algorithm design and analysis; Analytical models; Arithmetic; Computer Society; Computer networks; Cryptography; Data mining; Elliptic curve cryptography; Embedded computing; Fault detection; Frequency; Guidelines; Hardware; Logic; Permission; Public key cryptography; Read-write memory; Software testing; System testing; Cryptography; error-detecting code; fault attacks; fault detection.; parity code; residue code; symmetric cipher;
Journal_Title :
Computers, IEEE Transactions on
DOI :
10.1109/TC.2007.1015