首页> 外文会议>IEEE International Symposium on Hardware Oriented Security and Trust >Protecting block ciphers against differential fault attacks without re-keying
【24h】

Protecting block ciphers against differential fault attacks without re-keying

机译:保护块密码免遭差分故障攻击,而无需重新输入密钥

获取原文

摘要

In this article, we propose a new method to protect block cipher implementations against Differential Fault Attacks (DFA). Our strategy, so-called “Tweak-in-Plaintext”, ensures that an uncontrolled value ('tweak-in') is inserted into some part of the block cipher plaintext, thus effectively rendering DFA much harder to perform. Our method is extremely simple yet presents many advantages when compared to previous solutions proposed at AFRICACRYPT 2010 or CARDIS 2015. Firstly, we do not need any Tweakable block cipher, nor any related-key security assumption (we do not perform any re-keying). Moreover, performance for lightweight applications is improved, and we do not need to send any extra data. Finally, our scheme can be directly used with standard block ciphers such as AES or PRESENT. Experimental results show that the throughput overheads, for incorporating our scheme into AES-128, range between ≈ 5% to ≈ 26.9% for software, and between ≈ 3.1% to ≈ 25% for hardware implementations; depending on the tweak-in size.
机译:在本文中,我们提出了一种新的方法来保护块密码实现免受差分故障攻击(DFA)。我们的策略称为“ Tweak-in-Plaintext”,它确保将不受控制的值(“ tweak-in”)插入到块密码明文的某些部分中,从而有效地使DFA难以执行。与之前在AFRICACRYPT 2010或CARDIS 2015上提出的解决方案相比,我们的方法非常简单,但是却具有许多优势。首先,我们不需要任何可调整的分组密码,也不需要任何相关密钥的安全性假设(我们不执行任何重新加密) 。而且,轻量级应用程序的性能得到了改善,并且我们不需要发送任何额外的数据。最后,我们的方案可以直接用于标准分组密码,例如AES或PRESENT。实验结果表明,将我们的方案合并到AES-128中的吞吐量开销,对于软件而言介于≈5 \%至≈26.9 \%之间,对于硬件实现而言介于≈3.1 \%至≈25 \%之间。取决于调整的大小。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号