Security-oriented Code-based Architectures for Mitigating Fault Attacks

Batya Karp, Mael Gay, Osnat Keren, Ilia Polian

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

Error-detecting codes (EDCs) are an efficient and versatile tool to detect disturbances during the operation of a circuit. Historically, EDCs were considered in the context of reliability and safety, where failures were assumed to occur due to natural reasons, like noise or ageing. However, they have also been suggested in the security context, as an approach to counteract malicious physical attacks on cryptographic and other security-critical circuits. In this paper, we review recently developed security-oriented code constructions, pointing out the differences in assumptions and efficiency metrics for reliability- and security-oriented EDCs. We propose a number of architectures to apply these findings to actual cryptographic circuits. Experimental results obtained using a fault injector on an FPGA board demonstrate the detection and correction performance of the architectures.

Original languageEnglish
Title of host publicationProceedings - 33rd Conference on Design of Circuits and Integrated Systems, DCIS 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728101712
DOIs
StatePublished - 3 Apr 2019
Event33rd Conference on Design of Circuits and Integrated Systems, DCIS 2018 - Lyon, France
Duration: 14 Nov 201816 Nov 2018

Publication series

NameProceedings - 33rd Conference on Design of Circuits and Integrated Systems, DCIS 2018

Conference

Conference33rd Conference on Design of Circuits and Integrated Systems, DCIS 2018
Country/TerritoryFrance
CityLyon
Period14/11/1816/11/18

Bibliographical note

Publisher Copyright:
© 2018 IEEE.

Keywords

  • Error-detecting codes
  • Fault-injection attacks
  • Safety- and security-critical systems

Fingerprint

Dive into the research topics of 'Security-oriented Code-based Architectures for Mitigating Fault Attacks'. Together they form a unique fingerprint.

Cite this