Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14279/15355
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Azzi, Sabine | - |
dc.contributor.author | Barras, Bruno | - |
dc.contributor.author | Vigilant, David | - |
dc.contributor.author | Christofi, Maria Dolores | - |
dc.date.accessioned | 2019-09-24T05:39:58Z | - |
dc.date.available | 2019-09-24T05:39:58Z | - |
dc.date.issued | 2017-04-01 | - |
dc.identifier.citation | Journal of Cryptographic Engineering, 2017, vol. 7, no. 1, pp. 75-85 | en_US |
dc.identifier.issn | 21908516 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.14279/15355 | - |
dc.description.abstract | Recently, Bringer et al. [10] introduced a new countermeasure based on linear codes. This elegant design aims at protecting advanced encryption standard against both side-channel attacks and fault attacks (FA). However, the fault detection during nonlinear operations (for example SubBytes operation) was left as an open question. The present work studies how linear systematic error correcting codes can simply be used to detect fault injections during nonlinear operations in a symmetric block cipher. In particular, for the faults that cause errors with limited Hamming weight, this method can lead to interesting detection capabilities. Considering this way of protecting AES encryption against FA, a concrete implementation is presented. For a given fault model, a methodology of formal verification is applied to some parts of this implementation, assessing the fault resistance of one linear operation AddRoundKey and one nonlinear operation SubBytes. © 2016, Springer-Verlag Berlin Heidelberg. | en_US |
dc.format | en_US | |
dc.language.iso | en | en_US |
dc.relation.ispartof | Journal of Cryptographic Engineering | en_US |
dc.rights | © Springer | en_US |
dc.subject | AES | en_US |
dc.subject | Fault attack | en_US |
dc.subject | Formal proofs | en_US |
dc.subject | Linear error correcting code | en_US |
dc.subject | Static analysis | en_US |
dc.title | Using linear codes as a fault countermeasure for nonlinear operations: application to AES and formal verification | en_US |
dc.type | Article | en_US |
dc.collaboration | Gemalto | en_US |
dc.collaboration | Meudon sur Seine | en_US |
dc.collaboration | Cyprus University of Technology | en_US |
dc.subject.category | Basic Medicine | en_US |
dc.journals | Subscription | en_US |
dc.country | Cyprus | en_US |
dc.country | France | en_US |
dc.subject.field | Medical and Health Sciences | en_US |
dc.publication | Peer Reviewed | en_US |
dc.identifier.doi | 10.1007/s13389-016-0138-1 | en_US |
dc.relation.issue | 1 | en_US |
dc.relation.volume | 7 | en_US |
cut.common.academicyear | 2017-2018 | en_US |
dc.identifier.spage | 75 | en_US |
dc.identifier.epage | 85 | en_US |
item.openairetype | article | - |
item.cerifentitytype | Publications | - |
item.fulltext | No Fulltext | - |
item.grantfulltext | none | - |
item.openairecristype | http://purl.org/coar/resource_type/c_6501 | - |
item.languageiso639-1 | en | - |
crisitem.journal.journalissn | 2190-8516 | - |
crisitem.journal.publisher | Springer Nature | - |
Appears in Collections: | Άρθρα/Articles |
CORE Recommender
SCOPUSTM
Citations
10
checked on Nov 9, 2023
Page view(s)
301
Last Week
1
1
Last month
1
1
checked on Feb 2, 2025
Google ScholarTM
Check
Altmetric
Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.