• Publication
  • 2006
  • Issue No. 10 - October
  • Abstract - Tamper Proofing by Design Using Generalized Involution-Based Concurrent Error Detection for Involutional Substitution Permutation and Feistel Networks
 This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Tamper Proofing by Design Using Generalized Involution-Based Concurrent Error Detection for Involutional Substitution Permutation and Feistel Networks
October 2006 (vol. 55 no. 10)
pp. 1230-1239
Secure operation of cryptographic algorithms is critical to the success of secure transactions. Fault-based attacks that recover secret keys by deliberately introducing fault(s) in cipher implementations and analyzing the faulty outputs have been proven to be extremely powerful. Substitution Permutation Networks (SPN) and Feistel Networks (FN) are the two important classes of Symmetric Block Ciphers. Some SPN ciphers and all FN Ciphers satisfy the involution property. A function F is an involution if F(F(x)) = x. In this paper, we investigate tamper proofing techniques that use low cost involution-based time redundancy concurrent error detection (CED) schemes for involutional SPN and FN symmetric block ciphers. We incorporated this tamper proofing by design technique in a hardware implementation of the 128-bit ANUBIS SPN cipher (an involution variant of the Advanced Encryption Standard (AES)) and the 128-bit TwoFish FN cipher (an AES finalist). We performed fault simulation at both the algorithm and the gate level to show that the low-cost involution-based CED schemes, in addition to detecting all transient faults, can detect all single-bit permanent faults and > 99 percent of all multiple-bit permanent faults. Consequently, this low cost CED technique can protect the crypto device against Differential Fault Analysis (DFA) attacks.

[1] D. Boneh, R. DeMillo, and R. Lipton, “On the Importance of Checking Cryptographic Protocols for Faults,” Proc. Eurocrypt, pp. 37-51, 1997.
[2] E. Biham and A. Shamir, “Differential Fault Analysis of Secret Key Cryptosystems,” Proc. Crypto, Aug. 1997.
[3] J. Bloemer and J.-P. Seifert, “Fault Based Cryptanalysis of the Advanced Encryption Standard,” www.iacr.org/eprint/2002075.pdf, 2002.
[4] C. Giraud, “Differential Fault Analysis on AES,” http://eprint.iacr.org/2003008.ps, 2003.
[5] R. Karri, K. Wu, P. Mishra, and Y. Kim, “Concurrent Error Detection of Fault Based Side-Channel Cryptanalysis of 128-Bit Symmetric Block Ciphers,” IEEE Trans. Computer-Aided Design, Dec. 2002.
[6] G. Bertoni, L. Breveglieri, I. Koren, and V. Piuri, “On the Propagation of Faults and Their Detection in a Hardware Implementation of the Advanced Encryption Standard,” Proc. IEEE Int'l Conf. Application-Specific Systems, Architectures, and Processors (ASAP '02), pp. 303-312, 2002.
[7] G. Bertoni, L. Breveglieri, I. Koren, and V. Piuri, “Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard,” IEEE Trans. Computers, vol. 52, no. 4, pp. 492-505, Apr. 2003.
[8] J. Daemen, V. Rijmen, and P.S.L.M. Barreto, “Rijndael: Beyond the AES,” Mikulášská kryptobesídka 2002— Third Czech and Slovak Cryptography Workshop, Dec. 2002.
[9] A. Biryukov, “Analysis of Involutional Ciphers: KHAZAD and ANUBIS,” Proc. Third NESSIE Workshop, Nov. 2002.
[10] P.S.L.M. Barreto and V. Rijmen, “The KHAZAD Legacy-Level Block Cipher,” submitted to NESSIE Workshop, Sept. 2000.
[11] J. Daemen, M. Peeters, G. Assche, and V. Rijmen, “The Noekeon Block Cipher,” Proc. First Open NESSIE Workshop, Nov. 2000.
[12] P.S.L.M. Barreto and V. Rijmen, “The ANUBIS Block Cipher,” submitted to NESSIE, Sept. 2000.
[13] F. Standaert, G. Piret, and G. Rouvroy, “ICEBERG: An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware,” Proc. Foundations of Software Eng. (FSE), Feb. 2003.
[14] J. Daemen and V. Rijmen, “The Rijndael Block Cipher,” AES proposal submitted to US Nat'l Inst. of Standards and Tech nology, Mar. 1999.
[15] “Data Encryption Standard,” Federal Information Processing Standards Publication (FIPS PUB) 46, Nat'l Bureau of Standards, Washington D.C., 1977.
[16] B. Schneir, J. Kelsey, D. Whiting, D. Wagner, C. Hall, and N. Ferguson, “TwoFish: A 128-Bit Block Cipher,” AES candidate, June 1998, http:/www.schneir.com.

Index Terms:
Concurrent Error Detection (CED), tamper proofing, Subsitution Permutation Networks (SPN), Feistel networks, cryptography, ANUBIS, TwoFish.
Citation:
Nikhil Joshi, Jayachandran Sundararajan, Kaijie Wu, Bo Yang, Ramesh Karri, "Tamper Proofing by Design Using Generalized Involution-Based Concurrent Error Detection for Involutional Substitution Permutation and Feistel Networks," IEEE Transactions on Computers, vol. 55, no. 10, pp. 1230-1239, Oct. 2006, doi:10.1109/TC.2006.167
Usage of this product signifies your acceptance of the Terms of Use.