Proving SIFA Protection of Masked Redundant Circuits

07/05/2021
by   Vedad Hadzic, et al.
0

Implementation attacks like side-channel and fault attacks pose a considerable threat to cryptographic devices that are physically accessible by an attacker. As a consequence, devices like smart cards implement corresponding countermeasures like redundant computation and masking. Recently, statistically ineffective fault attacks (SIFA) were shown to be able to circumvent these classical countermeasure techniques. We present a new approach for verifying the SIFA protection of arbitrary masked implementations in both hardware and software. The proposed method uses Boolean dependency analysis, factorization, and known properties of masked computations to show whether the fault detection mechanism of redundant masked circuits can leak information about the processed secret values. We implemented this new method in a tool called Danira, which can show the SIFA resistance of cryptographic implementations like AES S-Boxes within minutes.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/02/2023

SAT-based Formal Fault-Resistance Verification of Cryptographic Circuits

Fault injection attacks represent a type of active, physical attack agai...
research
06/14/2021

Optical Fault Injection Attacks against Radiation-Hard Registers

If devices are physically accessible optical fault injection attacks pos...
research
09/11/2018

PUF-AES-PUF: a novel PUF architecture against non-invasive attacks

In this letter, a physical unclonable function (PUF)-advanced encryption...
research
04/13/2022

An End-to-End Analysis of EMFI on Bit-sliced Post-Quantum Implementations

Bit-slicing is a software implementation technique that treats an N-bit ...
research
01/09/2020

Voltage regulator assisted lightweight countermeasure against fault injection attacks

The impeccable design of sensitive and cryptographic circuits (CC) again...
research
10/29/2019

MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel Protection

Differential Power Analysis (DPA) has been an active area of research fo...
research
06/16/2020

A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs

Side-channel attacks, which are capable of breaking secrecy via side-cha...

Please sign up or login with your details

Forgot password? Click here to reset