Preventing fault attacks using fault randomisation with a case study on AES
by Shamit Ghosh; Dhiman Saha; Abhrajit Sengupta; Dipanwita Roy Chowdhury
International Journal of Applied Cryptography (IJACT), Vol. 3, No. 3, 2017

Abstract: Fault attacks are one of the most effective side-channel attacks on symmetric key ciphers. Over the years a variety of countermeasure techniques have been proposed to prevent this kind of attack. Among them, infective countermeasures have been shown to be the most efficient way to prevent fault attacks. However, none of the countermeasures has been found to last in terms of security. Battistello and Giraud (2013) have broken the last two surviving infective methods against fault attacks on AES and emphasised the need for a better security framework for fault attack countermeasures. The current work is the first such step towards achieving the design of a secure infective countermeasure as suggested by Battistello and Giraud (2013). In this paper, we develop a theoretical framework based on fault randomisation to formalise the infective approach used in fault attack countermeasures. On the basis of this formalisation, a new infective countermeasure is proposed which employs a randomised nonlinear mixing coupled with a linear diffusion function. A case study on AES with a practical construction of the countermeasure is presented. To achieve a more optimised design, cellular automata is employed. Both the designs are implemented on Xilinx SPARTAN-3 FPGA platform and compared favourably with a related scheme in the literature.

Online publication date: Sun, 03-Sep-2017

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Applied Cryptography (IJACT):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com