Implementation attacks like side-channel and fault attacks pose a considerable threat to cryptographic devices that are physically accessible by an attacker. As a consequence, devices like smart cards implement corresponding countermeasures like redundant computation and masking. Recently, statistically ineffective fault attacks (SIFA) were shown to be able to circumvent these classical countermeasure techniques. We present a new approach for verifying the SIFA protection of arbitrary masked implementations in both hardware and software. The proposed method uses Boolean dependency analysis, factorization, and known properties of masked computations to show whether the fault detection mechanism of redundant masked circuits can leak information about the processed secret values. We implemented this new method in a tool called Danira, which can show the SIFA resistance of cryptographic implementations like AES S-Boxes within minutes.
翻译:实施攻击,如侧道和断层攻击,对攻击者可以实际进入的加密装置构成相当大的威胁,因此,智能卡等装置会采取对应的反措施,如重复计算和蒙面。最近,统计上无效的断层攻击(SIFA)被证明能够绕过这些典型的反措施技术。我们提出了一个新的方法来核查SIFA对硬件和软件中任意掩蔽执行的保护。拟议方法使用Boolean依赖性分析、系数化和已知蒙面计算特性,以显示多余的遮蔽电路的故障探测机制能否泄露经过加工的秘密价值信息。我们用名为Danira的工具采用了这种新方法,它可以在几分钟内显示SIFAES S-Box等加密执行软件的阻力。