Abstract

Over the last years, physical attacks have been massively researched due to their capability to extract secret information from cryptographic engine. These hacking techniques are based on exploiting information from physical implementations instead of cryptographic algorithm flaws. Fault-injection attacks (FA) and Side-channel analysis (SCA) are the most popular techniques of implementation attacks. Aiming to secure cryptographic devices against such attacks, many studies have proposed a variety of developed and sophisticated countermeasures. Hence, the majority of these secured approaches are used for precise and single attack and it is difficult to thwart hybrid attack, such as combined power and fault attacks. In this work, the Advanced Encryption Standard is used as a case study in order to analyse the most well-known physical-based Hacking techniques: Differential Fault Analysis (DFA) and Correlation Power Analysis (CPA). Consequently, with the knowledge of such contemporary hacking technique, we proposed a low overhead countermeasure for the AES implementation that combines the concept of correlated power noise generating with a combined-approach based fault detection scheme.

Highlights

  • From a data security viewpoint, securing secret information requires using algorithms that resist theoretical hacking techniques

  • As the cryptographic algorithms are implemented on a physical platform, they are susceptible to well-known physical attacks, namely Fault Attacks (FA) and Side-Channel Analysis (SCA)

  • We perform an in-depth study of Differential fault attack (DFA) and Correlation power analysis www.ijacsa.thesai.org (IJACSA) International Journal of Advanced Computer Science and Applications, Vol 12, No 5, 2021 (CPA) and we propose a dual complementary advanced encryption standard (AES) cryptographic circuit to defend against both fault and power SCA attacks

Read more

Summary

Introduction

From a data security viewpoint, securing secret information requires using algorithms that resist theoretical hacking techniques. As the cryptographic algorithms are implemented on a physical platform, they are susceptible to well-known physical attacks, namely Fault Attacks (FA) and Side-Channel Analysis (SCA). These two classes of attacks exploit the physical interactions with cryptographic systems to break their security and extract secret information. These attacks are practical due to their methods to reveal the secret information from most cryptosystems which supposed to be cryptanalytically secure

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.