Fault-Based Side-Channel Cryptanalysis Tolerant Rijndael Symmetric Block Cipher Architecture

نویسندگان

  • Ramesh Karri
  • Kaijie Wu
  • Piyush Mishra
  • Yongkook Kim
چکیده

Ramesh Karri, Kaijie Wu, Piyush Mishra Yongkook Kim ECE Department, Polytechnic University IBM Corporation 6 Metrotech Center, Brooklyn, NY, 11201 Poughkeepsie, NY, 12601 [email protected],kwu03,[email protected] [email protected] Abstract Fault-based side channel cryptanalysis is very effective against symmetric and asymmetric encryption algorithms. Although straightforward hardware and time redundancy based Concurrent Error Detection (CED) architectures can be used to thwart such attacks, they entail significant overhead (either area or performance). In this paper we investigate systematic approaches to low-cost, low-latency CED for Rijndael symmetric encryption algorithm. These approaches exploit the inverse relationship that exists between Rijndael encryption and decryption at various levels and develop CED architectures that explore the trade-off between area overhead, performance penalty and error detection latency. The proposed techniques have been validated on FPGA implementations.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Concurrent error detection of fault-based side-channel cryptanalysis of 128-bit RC6 block cipher

Fault-based side channel cryptanalysis is very effective against symmetric and asymmetric encryption algorithms. Although straightforward hardware and time redundancy based concurrent error detection (CED) architectures can be used to thwart such attacks, they entail significant overhead (either area or performance). In this paper we investigate two systematic approaches to low-cost, low-latenc...

متن کامل

Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers

Fault-based side-channel cryptanalysis is very effective against symmetric and asymmetric encryption algorithms. Although straightforward hardware and time redundancy-based concurrent error detection (CED) architectures can be used to thwart such attacks, they entail significant overheads (either area or performance). The authors investigate systematic approaches to low-cost low-latency CED tec...

متن کامل

Extended Linear Cryptanalysis and Extended Piling-up Lemma

In this paper, we extend the idea of piling-up lemma and linear cryptanalysis applied to symmetric-key block ciphers. We also examine this new method of Extended Linear Cryptanalysis on two-round Rijndael, which is designed to be immune to linear cryptanalysis attack. Even though our results do not show much surprise on two-round Rijndael, the effects on other block ciphers remain open questions.

متن کامل

Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis

We introduce the notion of amplified side-channel attacks, i.e. the application of block cipher cryptanalysis techniques to amplify effects exploitable by side-channel attacks. Such an approach is advantageous since it fully exploits the special characteristics of each technique in situations where each thrives the most. As an example, we consider the integration of block cipher cryptanalysis t...

متن کامل

Analysis and design of block cipher constructions

This thesis is dedicated to symmetric cryptographic algorithms. The major focus of the work is on block ciphers themselves as well as on hash functions and message authentication codes based on block ciphers. Three main approaches to the cryptanalysis of symmetric cryptographic algorithms are pursued. First, several block cipher constructions are analyzed mathematically using statistical crypta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001