Skip to main content

A Hybrid Approach to Fault Detection in One Round of PP-1 Cipher

  • Conference paper
  • First Online:
Advances in Soft and Hard Computing (ACS 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 889))

Included in the following conference series:

  • 384 Accesses

Abstract

Deliberate injection of faults into cryptographic devices is an effective cryptanalysis technique against symmetric and asymmetric encryption algorithms. In this paper we describe concurrent error detection (CED) approach against such attacks in substitution-permutation network symmetric block ciphers on the example of PP-1 cipher. The specific objective of the design is to develop a method suitable for compact ASIC implementations targeted to embedded systems such as smart cards, cell phones, PDAs, and other mobile devices, such that the system is resistant to fault attacks. To provide the error detection it is proposed to adopt a hybrid approach consisting of multiple parity bits in combination with time redundancy. Taking such an approach gives a better ability to detect faults than simple parity codes. The proposed hybrid CED scheme is aimed at area-critical embedded applications, and achieves effective detection for single faults and most multiple faults. The system can detect the errors shortly after the faults are induced because the detection latency is only the output delay of each operation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The sorcerer’s apprentice guide to fault attacks. Proc. IEEE 94, 370–382 (2006)

    Article  Google Scholar 

  2. Bertoni, G., Breveglieri, L., Koren, I., Maistri, P., Piuri, V.: On the propagation of faults and their detection in a hardware implementation of the advanced encryption standard. In: Proceedings of Conference on Application-Specific Systems, Architectures, and Processors, pp. 303–312 (2002)

    Google Scholar 

  3. Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Proceedings of Cryptology (1997)

    Google Scholar 

  4. Boneh, D., DeMillo, R., Lipton, R.: On the importance of checking cryptographic protocols for faults. In: Proceedings of Eurocrypt. LNCS, vol. 1233, pp. 37–51. Springer (1997

    Google Scholar 

  5. Boneh, D., DeMillo, R., Lipton, R.: On the importance of eliminating errors in cryptographic computations. J. Cryptol. 14, 101–119 (2001)

    Article  MathSciNet  Google Scholar 

  6. Bucholc, K., Chmiel, K., Grocholewska-Czuryło, A., Stokłosa, J.: PP-1 block cipher. Pol. J. Environ. Stud. 16(5B), 315–320 (2007)

    MATH  Google Scholar 

  7. Idzikowska, E., Bucholc, K.: Error detection schemes for CED in block ciphers. In: Proceedings of the 5th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing EUC, Shanghai, pp. 22–27 (2008)

    Google Scholar 

  8. Idzikowska, E.: CED for involutional functions of PP-1 cipher. In: Proceedings of the 5th International Conference on Future Information Technology. Busan (2010)

    Google Scholar 

  9. Idzikowska, E.: CED for S-boxes of symmetric block ciphers. Electr. Rev. 56(10), 1179–1183 (2010)

    Google Scholar 

  10. Idzikowska, E.: An operation-centered approach to fault detection in key scheduling module of cipher. Electr. Rev. 93(1), 96–99 (2017)

    Google Scholar 

  11. Joshi, N., Wu, K., Karri, R.: Concurrent error detection schemes for involution ciphers. In: Proceedings of the 6th International Workshop CHES 2004. LNCS, vol. 3156, pp, 153–160. Springer (2004)

    Google Scholar 

  12. Wu, K., Karri, R., Kouznetzov, G., Goessel, M.: Low cost concurrent error detection for the advanced encryption standard. In: International Test Conference 2004, pp. 1242–1248 (2004)

    Google Scholar 

  13. Yen, C.-H., Wu, B.-F.: Simple error detection methods for hardware implementation of advanced encryption standard. IEEE Trans. Comput. 55(6), 720–731 (2006)

    Article  Google Scholar 

Download references

Acknowledgements

This research has been supported by Polish Ministry of Science and Higher Education under grant 04/45/DSPB/0163.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ewa Idzikowska .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Idzikowska, E. (2019). A Hybrid Approach to Fault Detection in One Round of PP-1 Cipher. In: Pejaś, J., El Fray, I., Hyla, T., Kacprzyk, J. (eds) Advances in Soft and Hard Computing. ACS 2018. Advances in Intelligent Systems and Computing, vol 889. Springer, Cham. https://doi.org/10.1007/978-3-030-03314-9_27

Download citation

Publish with us

Policies and ethics