Scan Attacks on Side-channel and Fault Attack Resistant Public-key Implementations

Abstract : Cryptographic devices are the targets of side-channel attacks, which exploit physical characteristics (e.g. power consumption) to compromise the system’s security. Several side-channel attacks and countermeasures have been proposed in the literature in the past decade. However, countermeasures are usually designed to resist attacks for a single side-channel. Few papers study the effects of a particular countermeasure on a specific side-channel attack on another attack which was not the target of the countermeasure. In this paper, we present scan-based side-channel attacks on public-key cryptographic hardware implementations in the presence countermeasures for power analysis and fault attacks. These aspects were not considered in any of the previous work on scan attacks. We have also considered the effect of Design for Test structures such as test compression and X-masking in our work to illustrate the effectiveness of our proposed scan-attack on practical implementations. Experimental results showing the requirement of the number of messages/points and retrieval time are presented to evaluate the complexity of the attacks. Results show that algorithmic countermeasures for Simple Power Analysis and Fault attack are not immune against our differential scan-attacks, whereas the algorithmic countermeasures against Differential Power Analysis are secure against such scan-attacks.
Type de document :
Article dans une revue
Journal of Cryptographic Engineering, Springer, 2012, 2 (4), pp.207-219. 〈10.1007/s13389-012-0045-z〉
Liste complète des métadonnées

https://hal-lirmm.ccsd.cnrs.fr/lirmm-01075412
Contributeur : Giorgio Di Natale <>
Soumis le : vendredi 17 octobre 2014 - 15:27:40
Dernière modification le : jeudi 24 mai 2018 - 15:59:24

Lien texte intégral

Identifiants

Collections

Citation

Jean Da Rolt, Amitabh Das, Santosh Ghosh, Giorgio Di Natale, Marie-Lise Flottes, et al.. Scan Attacks on Side-channel and Fault Attack Resistant Public-key Implementations. Journal of Cryptographic Engineering, Springer, 2012, 2 (4), pp.207-219. 〈10.1007/s13389-012-0045-z〉. 〈lirmm-01075412〉

Partager

Métriques

Consultations de la notice

103