TY - GEN
T1 - Security-Oriented State Assignment
AU - Shumsky, Igot
AU - Keren, Osnat
N1 - Place of conference:France
PY - 2013
Y1 - 2013
N2 - Modern error injection techniques allow an adversary
to attack cryptographic devices by inducing errors of
any multiplicity. The errors can be induced into every part
of the circuit, including to the Finite State Machine (FSM)
that controls the execution of cryptographic algorithms. One
of the most efficient countermeasures against these attacks are
error detecting codes. The codes are usually designed under the
assumption that the codewords occur with equal probability.
However, in most of the FSMs, some states (which are encoded as
binary codewords) are much more probable than others. In this
paper we show that when the probability distribution of the states
is highly skewed, the state assignment, i.e. the mapping between
the states and the codewords, determines the attack detection
capability of the codes. The worst case scenario is analyzed and
a method that allows the designer to avoid this scenario with a
relatively low cost is presented.
AB - Modern error injection techniques allow an adversary
to attack cryptographic devices by inducing errors of
any multiplicity. The errors can be induced into every part
of the circuit, including to the Finite State Machine (FSM)
that controls the execution of cryptographic algorithms. One
of the most efficient countermeasures against these attacks are
error detecting codes. The codes are usually designed under the
assumption that the codewords occur with equal probability.
However, in most of the FSMs, some states (which are encoded as
binary codewords) are much more probable than others. In this
paper we show that when the probability distribution of the states
is highly skewed, the state assignment, i.e. the mapping between
the states and the codewords, determines the attack detection
capability of the codes. The worst case scenario is analyzed and
a method that allows the designer to avoid this scenario with a
relatively low cost is presented.
UR - https://scholar.google.co.il/scholar?q=Security-Oriented+State+Assignment&btnG=&hl=en&as_sdt=0%2C5
M3 - Conference contribution
BT - 1st Workshop on Trustworthy Manufacturing and Utilization of Secure Devices, TRUDEVICE
ER -