Toward Effective Countermeasures against an Improved Fault Sensitivity Analysis
スポンサーリンク
概要
- 論文の詳細を見る
This paper proposes the countermeasures against an improved fault sensitivity analysis. Our countermeasure is proposed based on the WDDL technique due to its built-in resistance against both the power-based attack and differential fault analysis. At CHES 2010, Li et al. proposed the FSA attack on WDDL-AES. The vulnerability of WDDL-AES in their attack mainly comes from the implementation deficiency rather than the WDDL technique itself. This paper first proposes an improved fault sensitive analysis that can threat a well-implemented WDDL-AES based on the input-data dependency for the critical path delay of WDDL S-box. Then we discuss the possibility of efficient countermeasures by modifying the WDDL circuit with a limited overhead. The countermeasures are discussed based on either modifying the dual-rail to single-rail converter or the introduction of the enable signal.
- 2012-01-01
著者
-
OHTA Kazuo
University of Electro-Communications
-
Sakiyama Kazuo
Department Of Informatics The University Of Electro-communications
-
Li Yang
Department Of Informatics The University Of Electro-communications
-
Li Yang
Department Of Biochemistry Yong Loo Lin School Of Medicine National University Of Singapore
-
Ohta Kazuo
Department Of Informatics The University Of Electro-communications
関連論文
- Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC
- Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
- Toward the Fair Anonymous Signatures : Deniable Ring Signatures(Signatures,Cryptography and Information Security)
- Security of Cryptosystems Using Merkle-Damgård in the Random Oracle Model
- Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition
- Cryptanalysis of Two MD5-Based Authentication Protocols : APOP and NMAC
- Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols
- Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
- A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search
- New Message Differences for Collision Attacks on MD4 and MD5
- Improved Collision Attacks on MD4 and MD5(Hash Functions,Cryptography and Information Security)
- Universally composable client-to-client general authenticated key exchange (特集:情報システムを支えるコンピュータセキュリティ技術の再考)
- IS-81 Lipopolysaccharide Administration Worsen Hypoxic-ischemic Damage in Newborn Rats
- CD4^+ T cells are required for HSP65 expression in host macrophages and for protection of mice infected with Plasmodium yoelii
- On Clock-Based Fault Analysis Attack for an AES Hardware Using RSL
- Universally Composable Hierarchical Hybrid Authenticated Key Exchange(Protocols,Cryptography and Information Security)
- Role of the miR-106b-25 microRNA cluster in hepatocellular carcinoma
- GABA_C-Receptor Stimulation Activates cAMP-Dependent Protein Kinase via A-Kinase Anchoring Protein 220
- Improved Collision Search for Hash Functions : New Advanced Message Modification
- Probabilistic Multi-Signature Schemes Using a One-Way Trapdoor Permutation(Discrete Mathematics and Its Applications)
- OAEP-ES : Methodology of Universal Padding Technique (Asymmetric Cipher) (Cryptography and Information Security)
- Solutions to Security Problems of Rivest and Shamir's Pay Word Scheme(Application)(Cryptography and Information Security)
- Provably Secure Multisignatures in Formal Security Model and Their Optimality
- Taxonomical Security Consideration of OAEP Variants(Discrete Mathematics and Its Applications)
- Preparation and Characterization of Lyotropic Liquid Crystalline Aromatic Copolyamides Containing Twisty and Non-coplanar Moiety
- Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform
- Near-Collision Attacks on MD4 : Applied to MD4-Based Protocols
- Maurer-Yacobi ID-Based Key Distribution Revisited(Discrete Mathematics and Its Applications)
- Low Temperature Copper to Copper Direct Bonding
- Security of Cryptosystems Using Merkle-Damgard in the Random Oracle Model
- Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares(Discrete Mathematics and Its Applications)
- Ring signatures: universally composable definitions and constructions (特集:情報システムを支えるコンピュータセキュリティ技術の再考)
- Frequency-Hopping Pilot Patterns for OFDM Cellular Systems(Sequence Design and its Application in Communications)
- Differential-Linear Cryptanalysis of FEAL-8 (Special Section on Cryptography and Information Security)
- Leaky Random Oracle
- FOREWORD
- Universally Composable NBAC-Based Fair Voucher Exchange for Mobile Environments
- How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model
- Reduction of cardiovascular response to endotracheal intubation in normotensive patients by urapidil
- NMR study of peplomycin in aqueous solution : Assignment of resonances by means of two-dimensional spectroscopy
- Possible structural role of the disaccharide unit in Fe-bleomycin before and after oxygen activation
- Prehypertension in Children and Adolescents: Association with Body Weight and Neck Circumference
- Isolation and Characterization of Bacterial Isolates Algicidal against a Harmful Bloom-forming Cyanobacterium Microcystis aeruginosa
- Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128
- Toward Effective Countermeasures against an Improved Fault Sensitivity Analysis
- Proxiable Designated Verifier Signature
- Isolation and Characterization of Bacterial Isolates Algicidal against a Harmful Bloom-forming Cyanobacterium Microcystis aeruginosa
- A New Type of Fault-Based Attack: Fault Behavior Analysis
- Precoding Scheme for Distributed Antenna Systems with Non-Kronecker Correlation over Spatially Correlated Channel