Citation: | JIAO Zhipeng, CHEN Hua, FENG Jingyi, KUANG Xiaoyun, YANG Yiwei, LI Haoyuan, FAN Limin. A Combined Countermeasure Against Side-Channel and Fault Attack with Threshold Implementation Technique[J]. Chinese Journal of Electronics. doi: 10.1049/cje.2021.00.089 |
[1] |
P. Kocher, J. Jaffe and B. Jun, “Differential power analysis”, Advances in Cryptology – CRYPTO’99, Santa Barbara, CA, USA, pp. 388–397, 1999.
|
[2] |
E. Brier, C. Clavier and F. Olivier, “Correlation power analysis with a leakage model”, Cryptographic Hardware and Embedded Systems – CHES 2004, Cambridge, MA, USA, pp. 16–29, 2004.
|
[3] |
Suresh Chari, Josyula R. Rao and Pankaj Rohatgi, “Template attacks”, Cryptographic Hardware and Embedded Systems–CHES 2002, Redwood Shores, CA, USA, pp. 13–28, 2002.
|
[4] |
L. Goubin and J. Patarin, “DES and differential power analysis the “duplication” method”, Cryptographic Hardware and Embedded Systems–CHES 1999, Worcester, MA, USA, pp. 158–172, 1999.
|
[5] |
Svetla Nikova, Christian Rechberger and Vincent Rijmen, “Threshold implementations against side-channel attacks and glitches”, International Conference on Information and Communications Security, Raleigh, NC, USA, pp. 529–545, 2006.
|
[6] |
D. Boneh, R. DeMillo and R. Lipton, “On the Importance of checking cryptographic protocols for faults”, Advances in Cryptology – EUROCRYPT’97, Konstanz, Germany, pp. 37–51, 1997.
|
[7] |
Eli Biham and Adi Shamir, “Differential fault analysis of secret key cryptosystems”, Advances in Cryptology – CRYPTO’97, Santa Barbara, California, USA, pp. 513–525, 1997.
|
[8] |
Pierre Dusart, Gilles Letourneux and Olivier Vivolo, “Differential fault analysis on A.E.S”, Applied Cryptography and Network Security, Kunming, China, pp. 293-306, 2003.
|
[9] |
Jingyi Feng, Hua Chen, Si Gao, et al., “Fault Analysis on a New Block Cipher DBlock with at Most Two Fault Injections”, Chinese Journal of Electronics, Vol.27, No.6, pp.1277–1282, 2018. doi: 10.1049/cje.2018.09.003
|
[10] |
M. Joye, P. Manet and J. Rigaud, “Strengthening hardware AES implementations against fault attacks”, IET Information Security, Vol.1, No.3, pp.106–110, 2007. doi: 10.1049/iet-ifs:20060163
|
[11] |
Yuval Ishai, Manoj Prabhakaran, Amit Sahai, et al “Private circuits Ⅱ: Keeping secrets in tamperable circuits”, Advances in Cryptology – EUROCRYPT 2006, St. Petersburg, Russia, pp. 308–327, 2006.
|
[12] |
Tobias Schneider, Amir Moradi and Tim Güneysu, “ParTI - towards combined hardware countermeasures against sidechannel and fault-injection attacks”, Advances in Cryptology – CRYPTO 2016, Santa Barbara, CA, USA, pp. 302–332, 2016.
|
[13] |
Oscar Reparaz, Lauren De Meyer, Begül Bilgin, et al, “CAPA: The spirit of beaver against physical attacks”, Advances in Cryptology – CRYPTO 2018, Santa Barbara, CA, USA, pp. 121–151, 2018.
|
[14] |
L. De Meyer, V. Arribas, S. Nikova, et al., “M & M: Masks and macs against physical attacks”, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol.2019, No.1, pp.25–50, 2019.
|
[15] |
Jakub Breier and Xiaolu Hou, “Feeding two cats with one bowl: On designing a fault and side-channel resistant software encoding scheme”, Topics in Cryptology – CT-RSA 2017, San Francisco, CA, USA, pp. 77–94, 2017.
|
[16] |
O. Seker, A. Fernandez-Rubio, T. Eisenbarth, et al., “Extending glitch- free multiparty protocols to resist fault injection attacks”, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol.2018, No.3, pp.394–430, 2018.
|
[17] |
Yuval Ishai, Amit Sahai and David Wagner, “Private circuits: Securing hardware against probing attacks”, Advances in Cryptology – CRYPTO 2003, Santa Barbara, California, USA, pp. 463–481, 2003.
|
[18] |
Begül Bilgin, “Threshold implementations: as countermeasure against higher-order differential power analysis”, PhD thesis, University of KU Leuven at Heverlee, Belgium, University of Twente at Enschede, Netherlands, 2015
|
[19] |
V. Lomné, T. Roche and A. Thillard, “On the need of randomness in fault attack countermeasures - application to AES”, Proceedings of the 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven, Belgium, pp. 85–94, 2012.
|
[20] |
N.T. Courtois, D. Ware and K.M. Jackson, “Fault-Algebraic Attacks on Inner Rounds of DES”, Proceedings of eSmart, Riviera, French, pp. 22–24, 2010.
|
[21] |
C. Dobraunig, M. Eichlseder, T. Korak, et al., “SIFA: exploiting ineffective fault inductions on symmetric cryptography”, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol.2018, No.3, pp.547–572, 2018.
|
[22] |
C. Dobraunig, M. Eichlseder, H. Gross, et al, “Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures”, Advances in Cryptology – ASIACRYPT 2018, QLD, Australia, pp. 315–342, 2018.
|
[23] |
Jian Guo, Thomas Peyrin, Axel Poschmann, et al, “The LED block cipher”, Cryptographic Hardware and Embedded Systems – CHES 2011, Nara, Japan, pp. 326–341, 2011.
|
[24] |
A. Poschmann, A. Moradi, K. Khoo, et al., “Side-channel resistant crypto for less than 2,300 ge”, Journal of Cryptology, Vol.24, No.2, pp.322–345, 2011. doi: 10.1007/s00145-010-9086-6
|
[25] |
FARADAY TECHNOLOGY CORPORATION, Faraday FSA0A C 0.18 µm ASIC standard cell library, http://www.faraday-tech.com, 2004.
|
[26] |
Thomas de Cnudde and Svetla Nikova, “More efficient private circuits Ⅱ through threshold implementations”, 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), Santa Barbara, CA, USA, pp. 114–124, 2016.
|
[27] |
NANGATE, The NanGate 45nm Open Cell Library.
|
[28] |
Virtual Silicon Inc, 0.18 µm VIP Standard cell library tapeout ready, partnumber: UMCL18G212T3, process: UMC logic 0.18 µm generic Ⅱ technology: 0.18 µm, 2004.
|
[29] |
Goodwill Gilbert, Jun Benjamin, Jaffe Josh, et al, “A testing methodology for side-channel resistance validation”, NIST non-invasive attack testing workshop, Nara, Japan, 2011.
|
[30] |
Tobias Schneider and Amir Moradi, ”Leakage assessment methodology”, Cryptographic Hardware and Embedded Systems – CHES 2015, Saint-Malo, France, pp. 495–513, 2015.
|
[31] |
Kazuo Sakiyama, Yang Li, Mitsugu Iwamoto, et al., “Information-theoretic approach to optimal differential fault analysis”, IEEE Transactions on Information Forensics and Security, Vol.7, No.1, pp.109–120, 2012. doi: 10.1109/TIFS.2011.2174984
|