Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Information leakage from robust codes protecting cryptographic primitives

Information leakage from robust codes protecting cryptographic primitives

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Frontiers in Hardware Security and Trust; Theory, design and practice — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Cryptographic hardware primitives are subject to fault injection attacks. Security-oriented codes are considered the most powerful technique for detecting such attacks. They provide (probabilistic) guarantees for the detection of maliciously injected faults even under the assumption of a sophisticated attacker with access to powerful equipment. In this chapter, we revisit the earlier finding that error-detection infrastructure may increase the undesired information leakage. It is shown that the probability of an attack to be undetected by the best robust codes known today is exponentially smaller than the entropy loss due to information leak from the checker. This means that an attack will be detected far before the attacker can acquire significant information. The analysis is constrictive; given a bound for acceptable information leakage, it allows the designer to easily choose the number of redundant bits required to detect the attack before this bound is reached.

Chapter Contents:

  • 12.1 Introduction
  • 12.2 Fault injection attacks
  • 12.3 Robust code-based architectures
  • 12.4 Security-oriented codes
  • 12.5 Information leakage from robust code-based checkers
  • 12.5.1 Fault attack on the first round
  • 12.5.2 Fault attack on round i > 1
  • Acknowledgment
  • References

Inspec keywords: error detection codes; fault diagnosis; cryptography; probability

Other keywords: error-detection infrastructure; cryptographic hardware primitive protection; security-oriented codes; information leakage; maliciously injected fault attacks; robust codes; entropy loss

Subjects: Data security; Cryptography theory; Other topics in statistics; Codes; Cryptography; Other topics in statistics

Preview this chapter:
Zoom in
Zoomout

Information leakage from robust codes protecting cryptographic primitives, Page 1 of 2

| /docserver/preview/fulltext/books/cs/pbcs066e/PBCS066E_ch12-1.gif /docserver/preview/fulltext/books/cs/pbcs066e/PBCS066E_ch12-2.gif

Related content

content/books/10.1049/pbcs066e_ch12
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address