首页> 外文期刊>IEEE Transactions on Computers >Tamper Proofing by Design Using Generalized Involution-Based Concurrent Error Detection for Involutional Substitution Permutation and Feistel Networks
【24h】

Tamper Proofing by Design Using Generalized Involution-Based Concurrent Error Detection for Involutional Substitution Permutation and Feistel Networks

机译:通过使用基于通用对合的并发错误检测的对合置换置换和Feistel网络设计防篡改

获取原文
获取原文并翻译 | 示例

摘要

Secure operation of cryptographic algorithms is critical to the success of secure transactions. Fault-based attacks that recover secret keys by deliberately introducing fault(s) in cipher implementations and analyzing the faulty outputs have been proven to be extremely powerful. Substitution Permutation Networks (SPN) and Feistel Networks (FN) are the two important classes of Symmetric Block Ciphers. Some SPN ciphers and all FN Ciphers satisfy the involution property. A function F is an involution if F(F(x)) = x. In this paper, we investigate tamper proofing techniques that use low cost involution-based time redundancy concurrent error detection (CED) schemes for involutional SPN and FN symmetric block ciphers. We incorporated this tamper proofing by design technique in a hardware implementation of the 128-bit ANUBIS SPN cipher (an involution variant of the Advanced Encryption Standard (AES)) and the 128-bit TwoFish FN cipher (an AES finalist). We performed fault simulation at both the algorithm and the gate level to show that the low-cost involution-based CED schemes, in addition to detecting all transient faults, can detect all single-bit permanent faults and > 99 percent of all multiple-bit permanent faults. Consequently, this low cost CED technique can protect the crypto device against Differential Fault Analysis (DFA) attacks.
机译:密码算法的安全操作对于安全交易的成功至关重要。已经证明,通过在密码实现中故意引入错误并分析错误输出来恢复秘密密钥的基于错误的攻击非常强大。替代置换网络(SPN)和Feistel网络(FN)是对称块密码的两个重要类别。一些SPN密码和所有FN密码都满足对合性质。如果F(F(x))= x,则函数F是对合。在本文中,我们研究了防篡改技术,这些技术使用低成本的基于对合的SPN和FN对称块密码的基于对合的时间冗余并发错误检测(CED)方案。我们通过设计技术将此防篡改功能整合到128位ANUBIS SPN密码(高级加密标准(AES)的对合变体)和128位TwoFish FN密码(AES决赛入围者)的硬件实现中。我们在算法和门级都进行了故障仿真,结果表明,基于成本低廉的基于对合的CED方案除了检测所有瞬态故障外,还可以检测所有单个位永久性故障以及所有多位故障的99%以上永久性故障。因此,这种低成本的CED技术可以保护加密设备免受差分故障分析(DFA)攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号