A Hybrid Approach to Fault Detection in One Round of PP-1 Cipher
Deliberate injection of faults into cryptographic devices is an effective cryptanalysis technique against symmetric and asymmetric encryption algorithms. In this paper we describe concurrent error detection (CED) approach against such attacks in substitution-permutation network symmetric block ciphers on the example of PP-1 cipher. The specific objective of the design is to develop a method suitable for compact ASIC implementations targeted to embedded systems such as smart cards, cell phones, PDAs, and other mobile devices, such that the system is resistant to fault attacks. To provide the error detection it is proposed to adopt a hybrid approach consisting of multiple parity bits in combination with time redundancy. Taking such an approach gives a better ability to detect faults than simple parity codes. The proposed hybrid CED scheme is aimed at area-critical embedded applications, and achieves effective detection for single faults and most multiple faults. The system can detect the errors shortly after the faults are induced because the detection latency is only the output delay of each operation.
KeywordsConcurrent error detection PP-1 block cipher Parity bit code Fault detection Time redundancy
This research has been supported by Polish Ministry of Science and Higher Education under grant 04/45/DSPB/0163.
- 2.Bertoni, G., Breveglieri, L., Koren, I., Maistri, P., Piuri, V.: On the propagation of faults and their detection in a hardware implementation of the advanced encryption standard. In: Proceedings of Conference on Application-Specific Systems, Architectures, and Processors, pp. 303–312 (2002)Google Scholar
- 3.Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Proceedings of Cryptology (1997)Google Scholar
- 4.Boneh, D., DeMillo, R., Lipton, R.: On the importance of checking cryptographic protocols for faults. In: Proceedings of Eurocrypt. LNCS, vol. 1233, pp. 37–51. Springer (1997Google Scholar
- 7.Idzikowska, E., Bucholc, K.: Error detection schemes for CED in block ciphers. In: Proceedings of the 5th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing EUC, Shanghai, pp. 22–27 (2008)Google Scholar
- 8.Idzikowska, E.: CED for involutional functions of PP-1 cipher. In: Proceedings of the 5th International Conference on Future Information Technology. Busan (2010)Google Scholar
- 9.Idzikowska, E.: CED for S-boxes of symmetric block ciphers. Electr. Rev. 56(10), 1179–1183 (2010)Google Scholar
- 10.Idzikowska, E.: An operation-centered approach to fault detection in key scheduling module of cipher. Electr. Rev. 93(1), 96–99 (2017)Google Scholar
- 11.Joshi, N., Wu, K., Karri, R.: Concurrent error detection schemes for involution ciphers. In: Proceedings of the 6th International Workshop CHES 2004. LNCS, vol. 3156, pp, 153–160. Springer (2004)Google Scholar
- 12.Wu, K., Karri, R., Kouznetzov, G., Goessel, M.: Low cost concurrent error detection for the advanced encryption standard. In: International Test Conference 2004, pp. 1242–1248 (2004)Google Scholar