{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T10:10:17Z","timestamp":1720779017571},"reference-count":24,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T00:00:00Z","timestamp":1620259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"CONFISCA is the first generic SIMD-based software countermeasure that can concurrently resist against Side-Channel Attack (SCA) and Fault Injection (FI). Its promising strength is presented in a PRESENT cipher case study and compared to software-based Dual-rail with Pre-charge Logic concurrent countermeasure. It has lower overhead, wider usability, and higher protection. Its protection has been compared using Correlation Power Analysis, Welch\u2019s T-Test, Signal-to-Noise Ratio and Normalized Inter-Class Variance testing methods. CONFISCA can on-the-fly switch between its two modes of operation: The High-Performance and High-Security by having only one instance of the cipher. This gives us the flexibility to trade performance\/energy with security, based on the actual critical needs.<\/jats:p>","DOI":"10.3390\/cryptography5020013","type":"journal-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T02:36:24Z","timestamp":1620441384000},"page":"13","source":"Crossref","is-referenced-by-count":0,"title":["CONFISCA: An SIMD-Based Concurrent FI and SCA Countermeasure with Switchable Performance and Security Modes"],"prefix":"10.3390","volume":"5","author":[{"given":"Ehsan","family":"Aerabi","sequence":"first","affiliation":[{"name":"School of Computer Engineering, Iran University of Science and Technology, Tehran 16846-13114, Iran"},{"name":"Grenoble INP, Laboratoire de Conception et d\u2019Int\u00e9gration des Syst\u00e8mes (LCIS), Universit\u00e9 Grenoble Alpes, 26902 Valence, France"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3249-7667","authenticated-orcid":false,"given":"David","family":"H\u00e9ly","sequence":"additional","affiliation":[{"name":"Grenoble INP, Laboratoire de Conception et d\u2019Int\u00e9gration des Syst\u00e8mes (LCIS), Universit\u00e9 Grenoble Alpes, 26902 Valence, France"}]},{"given":"Cyril","family":"Bresch","sequence":"additional","affiliation":[{"name":"Grenoble INP, Laboratoire de Conception et d\u2019Int\u00e9gration des Syst\u00e8mes (LCIS), Universit\u00e9 Grenoble Alpes, 26902 Valence, France"}]},{"given":"Athanasios","family":"Papadimitriou","sequence":"additional","affiliation":[{"name":"Grenoble INP, Laboratoire de Conception et d\u2019Int\u00e9gration des Syst\u00e8mes (LCIS), Universit\u00e9 Grenoble Alpes, 26902 Valence, France"},{"name":"Department of Informatics, University of Piraeus, 18534 Piraeus, Greece"}]},{"given":"Mahdi","family":"Fazeli","sequence":"additional","affiliation":[{"name":"School of Computer Engineering, Iran University of Science and Technology, Tehran 16846-13114, Iran"}]}],"member":"1968","published-online":{"date-parts":[[2021,5,6]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Peeters, E. (2013). Advanced DPA Theory and Practice: Towards the Security Limits of Secure Embedded Circuits, Springer.","DOI":"10.1007\/978-1-4614-6783-0"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Joye, M., and Tunstall, M. (2012). Fault Analysis in Cryptography, Springer.","DOI":"10.1007\/978-3-642-29656-7"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Pahlevanzadeh, H., Dofe, J., and Yu, Q. (2016, January 25\u201328). Assessing CPA resistance of AES with different fault tolerance mechanisms. Proceedings of the 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), Holiday Inn Macao Cotai Central, Macao, China.","DOI":"10.1109\/ASPDAC.2016.7428087"},{"key":"ref_4","unstructured":"Papadimitriou, A., Nomikos, K., Psarakis, M., Aerabi, E., and H\u00e9ly, D. (2020, January 19\u201321). You can detect but you cannot hide: Fault Assisted Side Channel Analysis on Protected Software-based Block Ciphers. Proceedings of the 2020 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), Frascati, Italy."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Breier, J., Jap, D., and Bhasin, S. (2016, January 3\u20135). The other side of the coin: Analyzing software encoding schemes against fault injection attacks. Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), McLean, VA, USA.","DOI":"10.1109\/HST.2016.7495584"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Aerabi, E., Papadimitriou, A., and H\u00e9ly, D. (2019, January 1\u20133). On a side channel and fault attack concurrent countermeasure methodology for MCU-based byte-sliced cipher implementations. Proceedings of the 2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS), Rhodes Island, Greece.","DOI":"10.1109\/IOLTS.2019.8854372"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Danger, J.L., Guilley, S., Bhasin, S., and Nassar, M. (2009, January 6\u20139). Overview of dual rail with precharge logic styles to thwart implementation-level attacks on hardware cryptoprocessors. Proceedings of the 2009 3rd International Conference on Signals, Circuits and Systems (SCS), Medenine, Tunisia.","DOI":"10.1109\/ICSCS.2009.5412599"},{"key":"ref_8","first-page":"24","article-title":"Software Implementation of Dualrail Representation","volume":"51","author":"Hoogvorst","year":"2011","journal-title":"COSADE"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s13389-015-0105-2","article-title":"Formally proved security of assembly code against power analysis","volume":"6","author":"Rauzy","year":"2016","journal-title":"J. Cryptogr. Eng."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Chen, C., Eisenbarth, T., Shahverdi, A., and Ye, X. (2014). Balanced encoding to mitigate power analysis: A case study. International Conference on Smart Card Research and Advanced Applications, Springer.","DOI":"10.1007\/978-3-319-16763-3_4"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"De Meyer, L., Arribas, V., Nikova, S., Nikov, V., and Rijmen, V. (2019). M&M: Masks and Macs against physical attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst., 25\u201350.","DOI":"10.46586\/tches.v2019.i1.25-50"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Chaves, R., Chmielewski, \u0141., Regazzoni, F., and Batina, L. (2018, January 7\u20139). SCA-Resistance for AES: How Cheap Can We Go?. Proceedings of the International Conference on Cryptology in Africa, Marrakesh, Morocco.","DOI":"10.1007\/978-3-319-89339-6_7"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Resende, J.C., Ma\u00e7\u00e3s, R.J., and Chaves, R. (September, January 31). Mask Scrambling Against SCA on Reconfigurable TBOX-Based AES. Proceedings of the 2020 30th International Conference on Field-Programmable Logic and Applications (FPL), Virtual.","DOI":"10.1109\/FPL50879.2020.00048"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Chaves, R., Kuzmanov, G., Vassiliadis, S., and Sousa, L. (2006, January 25\u201329). Reconfigurable memory-based AES co-processor. Proceedings of the 20th IEEE International Parallel & Distributed Processing Symposium, Rhodes Island, Greece.","DOI":"10.1109\/IPDPS.2006.1639441"},{"key":"ref_15","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J., Seurin, Y., and Vikkelsoe, C. (2007, January 10\u201313). PRESENT: An ultra-lightweight block cipher. Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, Vienna, Austria."},{"key":"ref_16","unstructured":"Franchetti, F., and P\u00fcschel, M. (April, January 29). Generating SIMD vectorized permutations. Proceedings of the International Conference on Compiler Construction, Budapest, Hungary."},{"key":"ref_17","unstructured":"Mangard, S., Oswald, E., and Popp, T. (2008). Power Analysis Attacks: Revealing the Secrets of Smart Cards, Springer."},{"key":"ref_18","unstructured":"Roy, D.B., Bhasin, S., Guilley, S., Heuser, A., Patranabis, S., and Mukhopadhyay, D. (2021, April 28). Leak Me If You Can: Does TVLA Reveal Success Rate. Available online: https:\/\/eprint.iacr.org\/2016\/1152."},{"key":"ref_19","unstructured":"Heuser, A., Picek, S., Guilley, S., and Mentens, N. (December, January 30). Side-channel analysis of lightweight ciphers: Does lightweight equal easy?. Proceedings of the International Workshop on Radio Frequency Identification: Security and Privacy Issues, Hong Kong, China."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Kazemi, Z., Papadimitriou, A., Souvatzoglou, I., Aerabi, E., Ahmed, M.M., H\u00e9ly, D., and Beroulle, V. (2019, January 1\u20133). On a Low-Cost Fault Injection Framework for Security Assessment of Cyber-Physical Systems: Clock Glitch Attacks. Proceedings of the 2019 IEEE 4th International Verification and Security Workshop (IVSW), Rhodes Island, Greece.","DOI":"10.1109\/IVSW.2019.8854391"},{"key":"ref_21","unstructured":"Gilbert Goodwill, B.J., Jaffe, J., and Rohatgi, P. (2011, January 25\u201327). A testing methodology for side-channel resistance validation. Proceedings of the NIST Non-Invasive Attack Testing Workshop, Nara, Japan."},{"key":"ref_22","unstructured":"LASCAR (2021, March 20). Ledger\u2019s Advanced Side Channel Analysis Repository. Available online: https:\/\/github.com\/Ledger-Donjon\/lascar."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Bhasin, S., Danger, J.L., Guilley, S., and Najm, Z. (2014, January 15). Side-channel leakage and trace compression using normalized inter-class variance. Proceedings of the Third Workshop on Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA.","DOI":"10.1145\/2611765.2611772"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Wanderley, E., Vaslin, R., Crenne, J., Cotret, P., Gogniat, G., Diguet, J.P., Danger, J.L., Maurine, P., Fischer, V., and Badrignans, B. (2011). Security fpga analysis. Security Trends for FPGAS, Springer.","DOI":"10.1007\/978-94-007-1338-3_2"}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/5\/2\/13\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T09:38:44Z","timestamp":1720777124000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/5\/2\/13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,6]]},"references-count":24,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2021,6]]}},"alternative-id":["cryptography5020013"],"URL":"https:\/\/doi.org\/10.3390\/cryptography5020013","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,6]]}}}