Citation: | WANG Peijing, LIU Qiang. Mixed-grain parity-code-based fault detection method against fault injection[J]. Journal of Beijing University of Aeronautics and Astronautics, 2019, 45(4): 821-826. doi: 10.13700/j.bh.1001-5965.2018.0464(in Chinese) |
For efficient countermeasure against fault injection attacks, a mixed-grain parity-code-based fault detection approach was proposed. Traditional parity-code-based fault detection approach assigns a parity bit per
[1] |
BARENGHI A, BREVEGLIERI L, KOREN I, et al.Fault injection attacks on cryptographic devices:Theory, practice, and countermeasures[J].Proceedings of the IEEE, 2012, 100(11):3056-3076. doi: 10.1109/JPROC.2012.2188769
|
[2] |
LIU Y N, ZHANG J, WEI L X, et al.DERA: Yet another differential fault attack on cryptographic devices based on error rate analysis[C]//52nd ACM/EDAC/IEEE Design Automation Conference.Piscataway, NJ: IEEE Press, 2015.
|
[3] |
DUTERTRE J M, FOURNIER J J A, MIRBAHA A P, et al.Review of fault injection mechanisms and consequences on countermeasures design[C]//International Conference on Design & Technology of Integrated Systems in Nanoscale Era. Piscataway, NJ: IEEE Press, 2011: 5941421.
|
[4] |
CHU J, BENAISSA M.Error detecting AES using polynomial residue number systems[J].Microprocessors & Microsystems, 2013, 37(2):228-234. http://d.old.wanfangdata.com.cn/NSTLQK/NSTL_QKJJ0229919991/
|
[5] |
SONDON S, MANDOLESI P, JULIAN P, et al.Heavy-ion micro-beam use for transient fault injection in VLSI circuits[C]//International Conference on Plasma Sciences. Piscataway, NJ: IEEE Press, 2014: 7012614.
|
[6] |
KOOLI M, NATALE G D.A survey on simulation-based fault injection tools for complex systems[C]//IEEE International Conference on Design & Technology of Integrated Systems in Nanoscale Era. Piscataway, NJ: IEEE Press, 2014: 6850649.
|
[7] |
BENEVENUTI F, KASTENSMIDT F L.Evaluation of fault attack detection on SRAM-based FPGAs[C]//Test Symposium. Piscataway, NJ: IEEE Press, 2017: 7906747.
|
[8] |
MESTIRI H, BENHADJYOUSSEF N, MACHHOUT M, et al.A robust fault detection scheme for the advanced encryption standard[J].International Journal of Computer Network & Information Security, 2013, 5(6):49-55. http://d.old.wanfangdata.com.cn/OAPaper/oai_doaj-articles_0af74b6851168d87ca2f53435704f022
|
[9] |
TOMASHEVICH V, SRINIVASAN S, FOERG F, et al.Cross-level protection of circuits against faults and malicious attacks[C]//International on-Line Testing Symposium. Piscataway, NJ: IEEE Press, 2012: 150-155.
|
[10] |
MOZAFFARI-KERMANI M, REYHANI-MASOLEH A. Concurrent structure-independent fault detection schemes for the advanced encryption standard[J].IEEE Transactions on Computers, 2010, 59(5):608-622. doi: 10.1109/TC.2010.33
|
[11] |
BERTONI G, BREVEGLIERI L, KOREN I, et al.Concurrent fault detection in a hardware implementation of the RC5 encryption algorithm[J].Application-Specific Systems, Architectures, and Processors, 2003, 16(3):423-432. http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=CC026508925
|
[12] |
BEDOUI M, MESTIRI H, BOUALLEGUE B, et al.A reliable fault detection scheme for the AES hardware implementation[C]//International Symposium on Signal, Image, Video and Communications. Piscataway, NJ: IEEE Press, 2017: 47-52.
|
[13] |
WEN L, JIANG W, JIANG K, et al.Detecting fault injection attacks on embedded real-time applications: A system-level perspective[C]//2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems. Piscataway, NJ: IEEE Press, 2015: 700-705.
|
[14] |
GILL H S.Selection of parameter 'r' in RC5 algorithm on the basis of prime number[C]//Engineering and Computational Sciences. Piscataway, NJ: IEEE Press, 2014: 6799519.
|
[15] |
RIVEST R L.The RC5 encryption algorithm[C]//International Workshop on Fast Software Encryption. Berlin: Springer-Verlag, 1995: 86-96.
|
[16] |
BEVI A R, SHESHU S S V, MALARVIZHI S.FPGA based pipelined architecture for RC5 encryption[C]//Second International Conference on Digital Information and Communication Technology and It's Applications. Piscataway, NJ: IEEE Press, 2012: 214-219.
|