PROJECT TITLE :
Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-like Block Ciphers - 2017
Classical fault attacks, like differential fault analysis(DFA) with biased fault attacks, like the differential fault intensity analysis (DFIA), are a major threat to cryptosystems in recent times. DFA uses pairs of fault-free and faulty ciphertexts to recover the key key. DFIA, on the other hand, combines principles of aspect-channel analysis and fault attacks to try and extract the key using faulty ciphertexts solely. Till date, no effective countermeasure which will thwart each DFA- in addition to DFIA-based attacks has been reported in the literature to the most effective of our data. In particular, ancient redundancy-based countermeasures that assume uniform fault distributions are found to be vulnerable against the DFIA due to its use of biased fault models. In this paper, we have a tendency to propose a unique generic countermeasure strategy that mixes the principles of redundancy with that of fault area transformation to achieve security against both DFA- and DFIA-based mostly attacks on AES-like block ciphers. As a case study, we have applied our proposed technique to obtain temporal and spatial redundancy-based mostly countermeasures for AES-128, and have evaluated their security against both DFA and DFIA via sensible experiments on a SASEBO-GII board. Results show that our proposed countermeasure makes it practically infeasible to obtain one instance of successful fault injection, even within the presence of biased fault models.
Did you like this research project?
To get this research project Guidelines, Training and Code... Click Here