Proving SIFA protection of masked redundant circuits

Vedad Hadzic*, Robert Primas, Roderick Bloem

*Korrespondierende/r Autor/-in für diese Arbeit

Publikation: Beitrag in einer FachzeitschriftArtikelBegutachtung

Abstract

Implementation attacks like side-channel and fault attacks pose a considerable threat to cryptographic devices that are physically accessible by an attacker. As a consequence, devices like smart cards implement corresponding countermeasures like redundant computation and masking. Recently, statistical ineffective fault attacks (SIFA) have been shown to be able to circumvent these classical countermeasure techniques. We present a new approach for verifying the SIFA protection of arbitrary masked implementations in both hardware and software. The proposed method uses Boolean dependency analysis, factorization, and known properties of masked computations to show whether the fault detection mechanism of redundant masked circuits can leak information about the processed secret values. We implemented this new method in a tool called Danira, which can show the SIFA resistance of cryptographic implementations like AES S-Boxes within minutes.

Originalspracheenglisch
Seiten (von - bis)471-481
Seitenumfang11
FachzeitschriftInnovations in Systems and Software Engineering
Jahrgang18
Ausgabenummer3
DOIs
PublikationsstatusVeröffentlicht - Sept. 2022

ASJC Scopus subject areas

  • Software

Fingerprint

Untersuchen Sie die Forschungsthemen von „Proving SIFA protection of masked redundant circuits“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren