CryptoDB
Ventzislav Nikov
Publications
Year
Venue
Title
2023
TCHES
Who Watches the Watchers: Attacking Glitch Detection Circuits
Abstract
Over the last decades, fault injection attacks have been demonstrated to be an effective method for breaking the security of electronic devices. Some types of fault injection attacks, like clock and voltage glitching, require very few resources by the attacker and are practical and simple to execute. A cost-effective countermeasure against these attacks is the use of a detector circuit which detects timing violations - the underlying effect that glitch attacks rely on. In this paper, we take a closer look at three examples of such detectors that have been presented in the literature. We demonstrate four high-speed clock glitching attacks, which successfully inject faults in systems, where detectors have been implemented to protect. The attacks remain unnoticed by the glitch detectors. We verify our attacks with practical experiments on FPGA.
2019
TCHES
M&M: Masks and Macs against Physical Attacks
📺
Abstract
Cryptographic implementations on embedded systems need to be protected against physical attacks. Today, this means that apart from incorporating countermeasures against side-channel analysis, implementations must also withstand fault attacks and combined attacks. Recent proposals in this area have shown that there is a big tradeoff between the implementation cost and the strength of the adversary model. In this work, we introduce a new combined countermeasure M&M that combines Masking with information-theoretic MAC tags and infective computation. It works in a stronger adversary model than the existing scheme ParTI, yet is a lot less costly to implement than the provably secure MPC-based scheme CAPA. We demonstrate M&M with a SCA- and DFA-secure implementation of the AES block cipher. We evaluate the side-channel leakage of the second-order secure design with a non-specific t-test and use simulation to validate the fault resistance.
2018
CRYPTO
CAPA: The Spirit of Beaver Against Physical Attacks
📺
Abstract
In this paper we introduce two things: On one hand we introduce the Tile-Probe-and-Fault model, a model generalising the wire-probe model of Ishai et al. extending it to cover both more realistic side-channel leakage scenarios on a chip and also to cover fault and combined attacks. Secondly we introduce CAPA: a combined Countermeasure Against Physical Attacks. Our countermeasure is motivated by our model, and aims to provide security against higher-order SCA, multiple-shot FA and combined attacks. The tile-probe-and-fault model leads one to naturally look (by analogy) at actively secure multi-party computation protocols. Indeed, CAPA draws much inspiration from the MPC protocol SPDZ. So as to demonstrate that the model, and the CAPA countermeasure, are not just theoretical constructions, but could also serve to build practical countermeasures, we present initial experiments of proof-of-concept designs using the CAPA methodology. Namely, a hardware implementation of the KATAN and AES block ciphers, as well as a software bitsliced AES S-box implementation. We demonstrate experimentally that the design can resist second-order DPA attacks, even when the attacker is presented with many hundreds of thousands of traces. In addition our proof-of-concept can also detect faults within our model with high probability in accordance to the methodology.
2016
ASIACRYPT
2012
ASIACRYPT
Coauthors
- Victor Arribas (2)
- Amund Askeland (1)
- Begül Bilgin (4)
- Julia Borghoff (1)
- Anne Canteaut (1)
- Thomas De Cnudde (1)
- Lauren De Meyer (2)
- Martin Feldhofer (1)
- Benedikt Gierlichs (1)
- Tim Güneysu (1)
- Elif Bilge Kavun (1)
- Miroslav Knezevic (2)
- Lars R. Knudsen (1)
- Gregor Leander (1)
- Marcel Medwed (1)
- Ventzislav Nikov (10)
- Svetla Nikova (7)
- Christof Paar (1)
- Bart Preneel (1)
- Christian Rechberger (1)
- Oscar Reparaz (2)
- Vincent Rijmen (4)
- Peter Rombouts (2)
- Nigel P. Smart (1)
- François-Xavier Standaert (1)
- Georg Stütz (1)
- Søren S. Thomsen (1)
- Tolga Yalçin (1)