Title: Preventing fault attacks using fault randomisation with a case study on AES

Authors: Shamit Ghosh; Dhiman Saha; Abhrajit Sengupta; Dipanwita Roy Chowdhury

Addresses: Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, India ' Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, India ' Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, India ' Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, India

Abstract: Fault attacks are one of the most effective side-channel attacks on symmetric key ciphers. Over the years a variety of countermeasure techniques have been proposed to prevent this kind of attack. Among them, infective countermeasures have been shown to be the most efficient way to prevent fault attacks. However, none of the countermeasures has been found to last in terms of security. Battistello and Giraud (2013) have broken the last two surviving infective methods against fault attacks on AES and emphasised the need for a better security framework for fault attack countermeasures. The current work is the first such step towards achieving the design of a secure infective countermeasure as suggested by Battistello and Giraud (2013). In this paper, we develop a theoretical framework based on fault randomisation to formalise the infective approach used in fault attack countermeasures. On the basis of this formalisation, a new infective countermeasure is proposed which employs a randomised nonlinear mixing coupled with a linear diffusion function. A case study on AES with a practical construction of the countermeasure is presented. To achieve a more optimised design, cellular automata is employed. Both the designs are implemented on Xilinx SPARTAN-3 FPGA platform and compared favourably with a related scheme in the literature.

Keywords: infective countermeasure; AES; fault attack countermeasure; randomised mixing; cellular automata; maximum length nonlinearity.

DOI: 10.1504/IJACT.2017.086231

International Journal of Applied Cryptography, 2017 Vol.3 No.3, pp.225 - 235

Accepted: 30 Mar 2017
Published online: 03 Sep 2017 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article