Management of the security in smart secure devices

1 Introduction Security is a key component for information technologies and communication. It undoubtedly represents one of the main tools of its rise because it introduces confidence which is necessary for users. Among the security threats, vulnerability of electronic material that implements cryptography (such as smart card), for services of confidentiality, authentication and data integrity, is perhaps the most important. Indeed, some unfaithful means, or 'attacks', on this material make it possible to extract confidential information like encoding keys and thus to lower the security of all the protected transmission chain of information. There are three main kinds of such``physical'' attacks. The first kind, called``side channel attacks'', exploits the fact that some physical values such as the power consumption, the electromagnetic radiation or the duration of computation of the chip depend on its internal computations [KJ99,MP07]. It is of particular concern, since it does not destroy the physical integrity of smart cards and it can be quickly mounted with cheap instrumentation equipments. The second type, called``fault attacks'', consists in modifying the circuit's behavior in order to bypass hardware or software protections or to exploit computational errors [BS97,PQ03]. The faults are injected into the device by various means as laser, glitches on clock [AD10], spikes on voltage supply or electromagnetic perturbations. The third type, called``invasive attacks'' [KK99], consists in analyzing the design of the chip by using destructive means such as abrasion, chemical etching and then probing the most informative signals with, for example, focused ion beam. A lot of protections have been proposed to counter those attacks. The first kind (further called " sensors ") gives information about the state of the system either by measuring the light, the voltage, the frequency or the temperature of the chip or by detecting error during computations. This detection is generally based on spatial redundancy (ie. realizing the same computation several times in parallel) or temporal redundancy (i.e. realizing the same computation several times) [MR10,NR10]. The second kind (further called " actuators ") does not modify the functional behavior of the circuit but only secures it. To reduce sensibility to side channel attacks, noise has been added to the power consumption, for example, by using an internal clock, by randomizing the order of the instructions, by adding dummy operations or by masking the internal computations that can be predicted by the attacker [RP09,CK09]. Another way to reduce sensibility to side channel attacks consists …

[1]  M. Kuhn,et al.  The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .

[2]  David Naccache,et al.  When Clocks Fail: On Critical Paths and Clock Faults , 2010, CARDIS.

[3]  Sylvain Guilley,et al.  Evaluation of Power Constant Dual-Rail Logics Countermeasures against DPA with Design Time Security Metrics , 2010, IEEE Transactions on Computers.

[4]  E. H. Mandami Application of Fuzzy Logic to Approximate Reasoning using Linguistic Synthesis , 1977 .

[5]  Bruno Robisson,et al.  Low-cost fault tolerance on the ALU in simple pipelined processors , 2010, 13th IEEE Symposium on Design and Diagnostics of Electronic Circuits and Systems.

[6]  Emmanuel Prouff,et al.  Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers , 2009, CHES.

[7]  Stefan Mangard,et al.  Power analysis attacks - revealing the secrets of smart cards , 2007 .

[8]  Eli Biham,et al.  Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.

[9]  Marc Dacier,et al.  Intrusion detection , 1999, Comput. Networks.

[10]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[11]  Jean-Jacques Quisquater,et al.  A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD , 2003, CHES.

[12]  Arash Reyhani-Masoleh,et al.  Concurrent Structure-Independent Fault Detection Schemes for the Advanced Encryption Standard , 2010, IEEE Transactions on Computers.