TY - GEN
T1 - An efficient countermeasure against fault sensitivity analysis using configurable delay blocks
AU - Endo, Sho
AU - Li, Yang
AU - Homma, Naofumi
AU - Sakiyama, Kazuo
AU - Ohta, Kazuo
AU - Aoki, Takafumi
PY - 2012
Y1 - 2012
N2 - In this paper, we present an efficient countermeasure against Fault Sensitivity Analysis (FSA) based on a configurable delay blocks (CDBs). FSA is a new type of fault attack which exploits the relationship between fault sensitivity and secret information. Previous studies reported that it could break cryptographic modules equipped with conventional countermeasures against Differential Fault Analysis (DFA) such as redundancy calculation, Masked AND-OR and Wave Dynamic Differential Logic (WDDL). The proposed countermeasure can detect both DFA and FSA attacks based on setup time violation faults. The proposed ideas are to use a CDB as a time base for detection and to combine the technique with Li's countermeasure concept which removes the dependency between fault sensitivities and secret data. Post-manufacture configuration of the delay blocks allows minimization of the overhead in operating frequency which comes from manufacture variability. In this paper, we present an implementation of the proposed countermeasure, and describe its configuration method. We also investigate the hardware overhead of the proposed countermeasure implemented in ASIC for an AES module and demonstrate its validity through an experiment using a prototype FPGA implementation.
AB - In this paper, we present an efficient countermeasure against Fault Sensitivity Analysis (FSA) based on a configurable delay blocks (CDBs). FSA is a new type of fault attack which exploits the relationship between fault sensitivity and secret information. Previous studies reported that it could break cryptographic modules equipped with conventional countermeasures against Differential Fault Analysis (DFA) such as redundancy calculation, Masked AND-OR and Wave Dynamic Differential Logic (WDDL). The proposed countermeasure can detect both DFA and FSA attacks based on setup time violation faults. The proposed ideas are to use a CDB as a time base for detection and to combine the technique with Li's countermeasure concept which removes the dependency between fault sensitivities and secret data. Post-manufacture configuration of the delay blocks allows minimization of the overhead in operating frequency which comes from manufacture variability. In this paper, we present an implementation of the proposed countermeasure, and describe its configuration method. We also investigate the hardware overhead of the proposed countermeasure implemented in ASIC for an AES module and demonstrate its validity through an experiment using a prototype FPGA implementation.
KW - AES
KW - Configurable delay block
KW - Countermeasures
KW - Fault Sensitivity Analysis
UR - http://www.scopus.com/inward/record.url?scp=84867966858&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84867966858&partnerID=8YFLogxK
U2 - 10.1109/FDTC.2012.12
DO - 10.1109/FDTC.2012.12
M3 - Conference contribution
AN - SCOPUS:84867966858
SN - 9780769548340
T3 - Proceedings - 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2012
SP - 95
EP - 102
BT - Proceedings - 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2012
T2 - 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2012
Y2 - 9 September 2012 through 9 September 2012
ER -