Title :
Tamper Proofing by Design Using Generalized Involution-Based Concurrent Error Detection for Involutional Substitution Permutation and Feistel Networks
Author :
Joshi, Nikhil ; Sundararajan, Jayachandran ; Wu, Kaijie ; Yang, Bo ; Karri, Ramesh
Author_Institution :
Electr. & Comput. Eng. Dept., Polytech. Univ. Brooklyn
Abstract :
Secure operation of cryptographic algorithms is critical to the success of secure transactions. Fault-based attacks that recover secret keys by deliberately introducing fault(s) in cipher implementations and analyzing the faulty outputs have been proven to be extremely powerful. Substitution permutation networks (SPN) and Feistel networks (FN) are the two important classes of symmetric block ciphers. Some SPN ciphers and all FN ciphers satisfy the involution property. A function F is an involution if F(F(x)) = x. In this paper, we investigate tamper proofing techniques that use low cost involution-based time redundancy concurrent error detection (CED) schemes for involutional SPN and FN symmetric block ciphers. We incorporated this tamper proofing by design technique in a hardware implementation of the 128-bit ANUBIS SPN cipher (an involution variant of the advanced encryption standard (AES)) and the 128-bit TwoFish FN cipher (an AES finalist). We performed fault simulation at both the algorithm and the gate level to show that the low-cost involution-based CED schemes, in addition to detecting all transient faults, can detect all single-bit permanent faults and > 99 percent of all multiple-bit permanent faults. Consequently, this low cost CED technique can protect the crypto device against differential fault analysis (DFA) attacks
Keywords :
cryptography; error detection; fault simulation; 128-bit ANUBIS substitution permutation network cipher; 128-bit TwoFish Feistel network cipher; Feistel network; advanced encryption standard; crypto device; cryptographic algorithm; differential fault analysis attack; fault simulation; involution-based time redundancy concurrent error detection; involutional substitution permutation network; secret key recovery; secure transaction; symmetric block cipher; tamper proofing technique; Costs; Cryptography; Data mining; Data security; Doped fiber amplifiers; Fault detection; Hardware; Information analysis; Protection; Redundancy; ANUBIS; Concurrent Error Detection (CED); Feistel networks; Subsitution Permutation Networks (SPN); TwoFish.; cryptography; tamper proofing;
Journal_Title :
Computers, IEEE Transactions on
DOI :
10.1109/TC.2006.167