TY - GEN
T1 - SLICED
T2 - 2010 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2010
AU - Rajendran, Jeyavijayan
AU - Borad, Hetal
AU - Mantravadi, Shyam
AU - Karri, Ramesh
PY - 2010
Y1 - 2010
N2 - Fault attacks, wherein faults are deliberately injected into cryptographic devices, can compromise their security. Moreover, in the emerging nanometer regime of VLSI, accidental faults will occur at very high rates. While straightforward hardware redundancy based concurrent error detection (CED) can detect transient and permanent faults, it entails 100% area overhead. On the other hand, time redundancy based CED can only detect transient faults with minimum area overhead but entails 100% time overhead. In this paper we present a general time redundancy based CED technique called SLICED for pipelined implementations of symmetric block cipher. SLICED SLIdes one encryption over another and compares their results for CED as a basis for protection against accidental faults and deliberate fault attacks.
AB - Fault attacks, wherein faults are deliberately injected into cryptographic devices, can compromise their security. Moreover, in the emerging nanometer regime of VLSI, accidental faults will occur at very high rates. While straightforward hardware redundancy based concurrent error detection (CED) can detect transient and permanent faults, it entails 100% area overhead. On the other hand, time redundancy based CED can only detect transient faults with minimum area overhead but entails 100% time overhead. In this paper we present a general time redundancy based CED technique called SLICED for pipelined implementations of symmetric block cipher. SLICED SLIdes one encryption over another and compares their results for CED as a basis for protection against accidental faults and deliberate fault attacks.
KW - Concurrent Error Detection (CED)
KW - Cryptography
KW - Fault tolerance
KW - Sliding
KW - Symmetric block ciphers
UR - http://www.scopus.com/inward/record.url?scp=77955753141&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77955753141&partnerID=8YFLogxK
U2 - 10.1109/HST.2010.5513109
DO - 10.1109/HST.2010.5513109
M3 - Conference contribution
AN - SCOPUS:77955753141
SN - 9781424478101
T3 - Proceedings of the 2010 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2010
SP - 70
EP - 75
BT - Proceedings of the 2010 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2010
Y2 - 13 June 2010 through 14 June 2010
ER -