Journal of Innovation in Computer Science and Engineering

  • Year: 2019
  • Volume: 8
  • Issue: 2

Countermeasures Against Double Fault Attacks for Reconfigurable Array Architecture

  • Author:
  • Samson David, Briskila, Rajkumar Kalimuthu
  • Total Page Count: 7
  • DOI:
  • Page Number: 1 to 7

School of Computer Science & Information Technology, DMI-St. John The Baptist University, Malawi Central Africa

*Email: swansamson@gmail.com

**rajkumarengg2020@gmail.com

Online published on 7 October, 2019.

Abstract

With the increasing accuracy of fault injections, it has turn out to be viable to inject two faults into unique circuit areas precisely at a positive time. Unfortunately, most existing fault attack countermeasures are based on the single fault assumption, and it is, therefore, very difficult to face up to double fault attacks. Both the time and spatial locations of the injections must be controlled exactly in the double fault attacks to form a pair of exploitable faults. Reconfigurable array architecture (RAA) has the capability to introduce spatial and time randomness via dynamic reconfiguration, which can alleviate the threat of double fault attacks. This venture analyzes the double fault attack problems in the fault injection section systematically. An contrast model, named injection effort mannequin (IEM), is proposed to quantify the efforts of a successful fault injection. In IEM, the actual injection procedure is described mathematically the usage of the probability method, so that a theoretical groundwork can be provided for the corresponding countermeasure design. Based on the concept of spatial and time randomization, three countermeasures RBR, RPS, RDI are carried out on RAA for the reason of decreasing the implementation overhead beneath the premise of ensuring the security. Experiments are carried out to analyze the relationship between the resistance and the overhead using Advanced Encryption Standard (AES) and Data Encryption Standard (DES). It may want to be shown that when the three countermeasures are used in combination, a greater diploma of randomness can extend the resistance to a large extent.

Keywords

Fault attack, IEM, Fault injection, AES, DES