Abstract
It has been previously shown that hardware implementation of fault attack countermeasures based on error-detecting codes (EDCs) can make the circuit more vulnerable to power analysis attacks. We revisit this finding and show that the hypothesis space can grow significantly when a state-of-the-art security-oriented robust EDC is properly crafted. We use the Roth-Karp decomposition as an analytical tool to prove that by a simple re-ordering of the EDC's bits, the number of extra bits needed to formulate the hypotheses becomes so large that power analysis (that tries to exploit additional information from the redundant bits) is rendered infeasible.
Original language | English |
---|---|
Title of host publication | Proceedings of the 18th ACM International Conference on Computing Frontiers 2021, CF 2021 |
Publisher | Association for Computing Machinery, Inc |
Pages | 229-237 |
Number of pages | 9 |
ISBN (Electronic) | 9781450384049 |
DOIs | |
State | Published - 11 May 2021 |
Event | 18th ACM International Conference on Computing Frontiers 2021, CF 2021 - Virtual, Online, Italy Duration: 11 May 2021 → 13 May 2021 |
Publication series
Name | Proceedings of the 18th ACM International Conference on Computing Frontiers 2021, CF 2021 |
---|
Conference
Conference | 18th ACM International Conference on Computing Frontiers 2021, CF 2021 |
---|---|
Country/Territory | Italy |
City | Virtual, Online |
Period | 11/05/21 → 13/05/21 |
Bibliographical note
Publisher Copyright:© 2021 ACM.
Keywords
- error-detecting codes
- fault attacks
- information leakage
- physical attacks
- side-channel analysis