On resilience of security-oriented error detecting architectures against power attacks: A theoretical analysis

Osnat Keren, Ilia Polian

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

It has been previously shown that hardware implementation of fault attack countermeasures based on error-detecting codes (EDCs) can make the circuit more vulnerable to power analysis attacks. We revisit this finding and show that the hypothesis space can grow significantly when a state-of-the-art security-oriented robust EDC is properly crafted. We use the Roth-Karp decomposition as an analytical tool to prove that by a simple re-ordering of the EDC's bits, the number of extra bits needed to formulate the hypotheses becomes so large that power analysis (that tries to exploit additional information from the redundant bits) is rendered infeasible.

Original languageEnglish
Title of host publicationProceedings of the 18th ACM International Conference on Computing Frontiers 2021, CF 2021
PublisherAssociation for Computing Machinery, Inc
Pages229-237
Number of pages9
ISBN (Electronic)9781450384049
DOIs
StatePublished - 11 May 2021
Event18th ACM International Conference on Computing Frontiers 2021, CF 2021 - Virtual, Online, Italy
Duration: 11 May 202113 May 2021

Publication series

NameProceedings of the 18th ACM International Conference on Computing Frontiers 2021, CF 2021

Conference

Conference18th ACM International Conference on Computing Frontiers 2021, CF 2021
Country/TerritoryItaly
CityVirtual, Online
Period11/05/2113/05/21

Bibliographical note

Publisher Copyright:
© 2021 ACM.

Keywords

  • error-detecting codes
  • fault attacks
  • information leakage
  • physical attacks
  • side-channel analysis

Fingerprint

Dive into the research topics of 'On resilience of security-oriented error detecting architectures against power attacks: A theoretical analysis'. Together they form a unique fingerprint.

Cite this