7 research outputs found

    Cryptographic Fault Diagnosis using VerFI

    Get PDF
    Historically, fault diagnosis for integrated circuits has singularly dealt with reliability concerns. In contrast, a cryptographic circuit needs to be primarily evaluated concerning information leakage in the presence of maliciously crafted faults. While Differential Fault Attacks (DFAs) on symmetric ciphers have been known for over 20 years, recent developments have tried to structurally classify the attackers’ capabilities as well as the properties of countermeasures. Correct realization of countermeasures should still be manually verified, which is error-prone and infeasible for even moderate-size real-world designs. Here, we introduce the concept of Cryptographic Fault Diagnosis, which revises and shapes the notions of fault diagnosis in reliability testing to the needs of evaluating cryptographic implementations. Additionally, we present VerFI, which materializes the idea of Cryptographic Fault Diagnosis. It is a fully automated, open-source fault detection tool processing the gate-level representation of arbitrary cryptographic implementations. By adjusting the bounds of the underlying adversary model, VerFI allows us to rapidly examine the desired fault detection/correction capabilities of the given implementation. Among several case studies, we demonstrate its application on an implementation of LED cipher with combined countermeasures against side-channel analysis and fault-injection attacks (published at CRYPTO 2016). This experiment revealed general implementation flaws and undetectable faults leading to successful DFA on the protected design with full-key recovery

    Security of Ubiquitous Computing Systems

    Get PDF
    The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license

    Security of Ubiquitous Computing Systems

    Get PDF
    The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license

    The Quest for an Appropriate Past in Literature, Art and Architecture

    Get PDF
    This volume explores the various strategies of construing appropriate pasts in scholarship, literature, art, architecture and literature, in order to create “national”, regional or local identities, in late medieval and early modern Europe. Readership: All those interested in the reception of Antiquity and high medieval history (true and false) in early modern in literature, architecture and art, neolatin scholarship, Renaissance architecture, history of ideas, history of literature, and history of humanist scholarship

    The Quest for an Appropriate Past in Literature, Art and Architecture

    Get PDF
    This volume explores the various strategies of construing appropriate pasts in scholarship, literature, art, architecture and literature, in order to create “national”, regional or local identities, in late medieval and early modern Europe. Readership: All those interested in the reception of Antiquity and high medieval history (true and false) in early modern in literature, architecture and art, neolatin scholarship, Renaissance architecture, history of ideas, history of literature, and history of humanist scholarship
    corecore