【24h】

Fault Tolerant Infective Countermeasure for AES

机译:AES的容错感染性对策

获取原文

摘要

Infective countermeasures have been a promising class of fault attack countermeasures. However, they have been subjected to several attacks owing to lack of formal proofs of security and improper implementations. In this paper, we first provide a formal information theoretic proof of security for one of the most recently proposed state of the art infective countermeasures against DFA, under the assumption that the adversary does not change the flow sequence or skip any instruction. Subsequently, we identify weaknesses in the infection mechanism of the countermeasure that could be exploited by attacks which change the flow sequence. Furthermore, we propose an augmented infective counter-measure scheme obtained by introducing suitable randomizations that reduce the success probabilities of such attacks. All the claims have been validated by supporting simulations and real life experiments on a SASEBO-W platform. We also compare the fault tolerance provided by our proposed countermeasure scheme against that provided by the existing scheme.
机译:传染性对策一直是有前途的故障攻击对策。但是,由于缺乏正式的安全证明和不正确的实施方式,它们遭受了数次攻击。在本文中,我们首先为对手提出的最新提出的针对DFA的最先进的传染性对策之一提供形式信息安全的理论理论证明,前提是假设对手不改变流程或跳过任何指令。随后,我们确定了对策的感染机制中的弱点,这些弱点可以被改变流程顺序的攻击所利用。此外,我们提出了一种通过引入适当的随机化措施来减少此类攻击成功几率而获得的增强型传染对策方案。所有声明均已通过在SASEBO-W平台上支持模拟和现实生活实验而得到验证。我们还将提议的对策方案提供的容错能力与现有方案提供的容错能力进行了比较。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号