Volume 45 Issue 4
Apr.  2019
Turn off MathJax
Article Contents
WANG Peijing, LIU Qiang. Mixed-grain parity-code-based fault detection method against fault injection[J]. Journal of Beijing University of Aeronautics and Astronautics, 2019, 45(4): 821-826. doi: 10.13700/j.bh.1001-5965.2018.0464(in Chinese)
Citation: WANG Peijing, LIU Qiang. Mixed-grain parity-code-based fault detection method against fault injection[J]. Journal of Beijing University of Aeronautics and Astronautics, 2019, 45(4): 821-826. doi: 10.13700/j.bh.1001-5965.2018.0464(in Chinese)

Mixed-grain parity-code-based fault detection method against fault injection

doi: 10.13700/j.bh.1001-5965.2018.0464
Funds:

National Natural Science Foundation of China 61574099

More Information
  • Corresponding author: LIU Qiang, E-mail: qiangliu@tju.edu.cn
  • Received Date: 03 Aug 2018
  • Accepted Date: 14 Sep 2018
  • Publish Date: 20 Apr 2019
  • For efficient countermeasure against fault injection attacks, a mixed-grain parity-code-based fault detection approach was proposed. Traditional parity-code-based fault detection approach assigns a parity bit per n bits, representing the parity of the n-bit word. As n decreases, the number of parity bits increases, leading to increased resource usage and fault detection rate. To achieve tradeoff between fault coverage and resource usage, the fine-grain parity code (small n) was applied to the data processed in the fault-sensitive parts or critical parts of circuits, and the coarse-grain parity code was applied to other parts of circuits. The approach was applied to RC5 encryption algorithm to explain the principle and application of the mixed-grain parity-code-based fault detection technology, and to theoretically analyze the fault coverage and resource usage of different grain solutions. The experimental results show that, compared to the RC5 circuit with one parity bit per 32 bit, the mixed-grain parity-code-based detection approach improves the fault coverage by 29.44% and increases resource usage slightly by 2.48%.

     

  • loading
  • [1]
    BARENGHI A, BREVEGLIERI L, KOREN I, et al.Fault injection attacks on cryptographic devices:Theory, practice, and countermeasures[J].Proceedings of the IEEE, 2012, 100(11):3056-3076. doi: 10.1109/JPROC.2012.2188769
    [2]
    LIU Y N, ZHANG J, WEI L X, et al.DERA: Yet another differential fault attack on cryptographic devices based on error rate analysis[C]//52nd ACM/EDAC/IEEE Design Automation Conference.Piscataway, NJ: IEEE Press, 2015.
    [3]
    DUTERTRE J M, FOURNIER J J A, MIRBAHA A P, et al.Review of fault injection mechanisms and consequences on countermeasures design[C]//International Conference on Design & Technology of Integrated Systems in Nanoscale Era. Piscataway, NJ: IEEE Press, 2011: 5941421.
    [4]
    CHU J, BENAISSA M.Error detecting AES using polynomial residue number systems[J].Microprocessors & Microsystems, 2013, 37(2):228-234. http://d.old.wanfangdata.com.cn/NSTLQK/NSTL_QKJJ0229919991/
    [5]
    SONDON S, MANDOLESI P, JULIAN P, et al.Heavy-ion micro-beam use for transient fault injection in VLSI circuits[C]//International Conference on Plasma Sciences. Piscataway, NJ: IEEE Press, 2014: 7012614.
    [6]
    KOOLI M, NATALE G D.A survey on simulation-based fault injection tools for complex systems[C]//IEEE International Conference on Design & Technology of Integrated Systems in Nanoscale Era. Piscataway, NJ: IEEE Press, 2014: 6850649.
    [7]
    BENEVENUTI F, KASTENSMIDT F L.Evaluation of fault attack detection on SRAM-based FPGAs[C]//Test Symposium. Piscataway, NJ: IEEE Press, 2017: 7906747.
    [8]
    MESTIRI H, BENHADJYOUSSEF N, MACHHOUT M, et al.A robust fault detection scheme for the advanced encryption standard[J].International Journal of Computer Network & Information Security, 2013, 5(6):49-55. http://d.old.wanfangdata.com.cn/OAPaper/oai_doaj-articles_0af74b6851168d87ca2f53435704f022
    [9]
    TOMASHEVICH V, SRINIVASAN S, FOERG F, et al.Cross-level protection of circuits against faults and malicious attacks[C]//International on-Line Testing Symposium. Piscataway, NJ: IEEE Press, 2012: 150-155.
    [10]
    MOZAFFARI-KERMANI M, REYHANI-MASOLEH A. Concurrent structure-independent fault detection schemes for the advanced encryption standard[J].IEEE Transactions on Computers, 2010, 59(5):608-622. doi: 10.1109/TC.2010.33
    [11]
    BERTONI G, BREVEGLIERI L, KOREN I, et al.Concurrent fault detection in a hardware implementation of the RC5 encryption algorithm[J].Application-Specific Systems, Architectures, and Processors, 2003, 16(3):423-432. http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=CC026508925
    [12]
    BEDOUI M, MESTIRI H, BOUALLEGUE B, et al.A reliable fault detection scheme for the AES hardware implementation[C]//International Symposium on Signal, Image, Video and Communications. Piscataway, NJ: IEEE Press, 2017: 47-52.
    [13]
    WEN L, JIANG W, JIANG K, et al.Detecting fault injection attacks on embedded real-time applications: A system-level perspective[C]//2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems. Piscataway, NJ: IEEE Press, 2015: 700-705.
    [14]
    GILL H S.Selection of parameter 'r' in RC5 algorithm on the basis of prime number[C]//Engineering and Computational Sciences. Piscataway, NJ: IEEE Press, 2014: 6799519.
    [15]
    RIVEST R L.The RC5 encryption algorithm[C]//International Workshop on Fast Software Encryption. Berlin: Springer-Verlag, 1995: 86-96.
    [16]
    BEVI A R, SHESHU S S V, MALARVIZHI S.FPGA based pipelined architecture for RC5 encryption[C]//Second International Conference on Digital Information and Communication Technology and It's Applications. Piscataway, NJ: IEEE Press, 2012: 214-219.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(5)  / Tables(3)

    Article Metrics

    Article views(523) PDF downloads(440) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return