Enhancement of Hardware Security by Hamming-Ball Based State Assignment

Igor Shumsky, Osnat Keren

Research output: Contribution to journalArticlepeer-review

6 Scopus citations

Abstract

Modern fault injection techniques allow an adversary to attack cryptographic devices by inducing errors of any multiplicity. The induced errors can affect any part of the circuit, including the Finite State Machine (FSM) that controls the execution of cryptographic algorithms. One of the most efficient countermeasures against these attacks is robust error detecting codes. Robust codes are usually designed under the assumption that the code words occur with equal probability. However, in most FSMs, some states (which are encoded as binary code words) are much more probable than others. In this paper, we show that when the probability distribution of the states is highly skewed, the state assignment, that is, the mapping between the states and the code words, determines the attack detection capability. A worst-case scenario is analyzed, and a method that allows the designer to avoid this scenario with a relatively low cost is presented. The proposed security-oriented method and random state assignment are analyzed with benchmark FSMs.

Original languageEnglish
Pages (from-to)216-225
Number of pages10
JournalInformation Security Journal
Volume22
Issue number5-6
DOIs
StatePublished - Nov 2013

Bibliographical note

Funding Information:
This research was supported by the Israel Science Foundation Grant No. 1200/12 and by the TRUDEVICE Cost Action IC1204.

Funding

This research was supported by the Israel Science Foundation Grant No. 1200/12 and by the TRUDEVICE Cost Action IC1204.

FundersFunder number
Israel Science Foundation1200/12, IC1204

    Keywords

    • fault analysis attacks
    • nonuniform distribution
    • puncturing
    • robust codes
    • security
    • sequential circuits
    • undetected error probability

    Fingerprint

    Dive into the research topics of 'Enhancement of Hardware Security by Hamming-Ball Based State Assignment'. Together they form a unique fingerprint.

    Cite this