Can Algorithm Diversity in Stream Cipher Implementation Thwart (Natural and) Malicious Faults?

Xiaofei Guo, Chenglu Jin, Chi Zhang, Athanasios Papadimitriou, David Hely, Ramesh Karri

Research output: Contribution to journalArticle

Abstract

Hardware implementations of stream and other ciphers are vulnerable to natural faults. Moreover, attackers can launch fault attacks on these implementations. Concurrent error detection is used as a countermeasure against natural and malicious faults. We propose an algorithm diversity (AD) to detect natural and malicious faults in stream ciphers. We compare AD with hardware, time, and information redundancies. Hardware redundancy has 100% hardware overhead, but is not secure against fault attacks. Time redundancy has lower hardware overhead, but is vulnerable to faults that are injected in both the computation and recomputation. Information redundancy techniques, such as parity, cannot detect an even number of faulty bits. Information redundancy techniques, such as robust code, have higher fault miss rate (FMR) with higher hardware overhead. If robust code is configured to have lower FMR than AD in certain attacker model, the hardware overhead is excessively high. AD provides higher security compared to existing techniques. It enables a cost-effective tradeoff between security, performance overhead, and hardware overhead.

Original languageEnglish (US)
Article number7110553
Pages (from-to)363-373
Number of pages11
JournalIEEE Transactions on Emerging Topics in Computing
Volume4
Issue number3
DOIs
StatePublished - Jan 1 2016

    Fingerprint

Keywords

  • Concurrent error detection
  • algorithm diversity
  • differential fault analysis
  • fault attack
  • reliability
  • stream cipher

ASJC Scopus subject areas

  • Computer Science (miscellaneous)
  • Information Systems
  • Human-Computer Interaction
  • Computer Science Applications

Cite this