Download PDFOpen PDF in browser

Detection and Correction of Malicious and Natural Faults in Cryptographic Modules

15 pagesPublished: September 10, 2018

Abstract

Today’s electronic systems must simultaneously fulfill strict requirements on security and reliability. In particular, their cryptographic modules are exposed to faults, which can be due to natural failures (e.g., radiation or electromagnetic noise) or malicious fault- injection attacks. We present an architecture based on a new class of error-detecting codes that combine robustness properties with a minimal distance. The new architecture guarantees (with some probability) the detection of faults injected by an intelligent and strategic adversary who can precisely control the disturbance. At the same time it supports automatic correction of low-multiplicity faults. To this end, we discuss an efficient technique to correct single errors while avoiding full syndrome analysis. We report experimental results obtained by physical fault injection on the SAKURA-G FPGA board.

Keyphrases: Fault attacks and defenses, On-chip monitoring of physical attacks, Synergies between security and reliability

In: Lejla Batina, Ulrich Kühne and Nele Mentens (editors). PROOFS 2018. 7th International Workshop on Security Proofs for Embedded Systems, vol 7, pages 68--82

Links:
BibTeX entry
@inproceedings{PROOFS2018:Detection_and_Correction_of,
  author    = {Batya Karp and Ma\textbackslash{}"el Gay and Osnat Keren and Ilia Polian},
  title     = {Detection and Correction of Malicious and Natural Faults in Cryptographic Modules},
  booktitle = {PROOFS 2018. 7th International Workshop on Security Proofs for Embedded Systems},
  editor    = {Lejla Batina and Ulrich K\textbackslash{}"uhne and Nele Mentens},
  series    = {Kalpa Publications in Computing},
  volume    = {7},
  pages     = {68--82},
  year      = {2018},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2515-1762},
  url       = {https://easychair.org/publications/paper/zMjh},
  doi       = {10.29007/w37p}}
Download PDFOpen PDF in browser