Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Paolo Maistri is active.

Publication


Featured researches published by Paolo Maistri.


IEEE Transactions on Computers | 2003

Error analysis and detection procedures for a hardware implementation of the advanced encryption standard

Guido Bertoni; Luca Breveglieri; Israel Koren; Paolo Maistri; Vincenzo Piuri

The goal of the Advanced Encryption Standard (AES) is to achieve secure communication. The use of AES does not, however, guarantee reliable communication. Prior work has shown that even a single transient error occurring during the AES encryption (or decryption) process will very likely result in a large number of errors in the encrypted/decrypted data. Such faults must be detected before sending to avoid the transmission and use of erroneous data. Concurrent fault detection is important not only to protect the encryption/decryption process from random faults. It will also protect the encryption/decryption circuitry from an attacker who may maliciously inject faults in order to find the encryption secret key. In this paper, we first describe some studies of the effects that faults may have on a hardware implementation of AES by analyzing the propagation of such faults to the outputs. We then present two fault detection schemes: The first is a redundancy-based scheme while the second uses an error detecting code. The latter is a novel scheme which leads to very efficient and high coverage fault detection. Finally, the hardware costs and detection latencies of both schemes are estimated.


design, automation, and test in europe | 2009

Statistical fault injection: quantified error and confidence

Régis Leveugle; A. Calvez; Paolo Maistri; Pierre Vanhauwaert

Fault injection has become a very classical method to determine the dependability of an integrated system with respect to soft errors. Due to the huge number of possible error configurations in complex circuits, a random selection of a subset of potential errors is usual in practical experiments. The main limitation of such a selection is the confidence in the outcomes that is never quantified in the articles. This paper proposes an approach to quantify both the error on the presented results and the confidence on the presented interval. The computation of the required number of faults to inject in order to achieve a given confidence and error interval is also discussed. Experimental results are shown and fully support the presented approach.


defect and fault tolerance in vlsi and nanotechnology systems | 2004

An efficient hardware-based fault diagnosis scheme for AES: performances and cost

Guido Bertoni; Luca Breveglieri; Israel Koren; Paolo Maistri

Since standardization in 2001, the Advanced Encryption Standard has been the subject of many research efforts, aimed at developing efficient hardware implementations with reduced area and latency. So far, reliability has not been considered a primary objective. Recently, several error detecting schemes have been proposed in order to provide some defense against hardware faults in AES. The benefits of such schemes are twofold: avoiding wrong outputs when benign hardware faults occur, and preventing the collection of information about the secret key through malicious injection of faults. In this paper, we present a complete scheme for parity-based fault detection in a hardware implementation of the Advanced Encryption Standard which includes a key schedule unit. We also provide a preliminary evaluation of the hardware and latency overhead of the proposed scheme.


defect and fault tolerance in vlsi and nanotechnology systems | 2002

A parity code based fault detection for an implementation of the Advanced Encryption Standard

Guido Bertoni; Luca Breveglieri; Israel Koren; Paolo Maistri; Vincenzo Piuri

Concurrent fault detection for a hardware implementation of the Advanced Encryption Standard (AES) is important not only to protect the encryption/decryption process from random faults. It will also protect the encryption/decryption circuitry from an attacker who may maliciously inject faults in order to find the encryption secret key. In this paper we present a novel fault detection scheme which is based on a multiple parity bit code and show that the proposed scheme leads to very efficient and high coverage fault detection. We then estimate the associated hardware costs and detection latencies.


IEEE Transactions on Computers | 2007

An Operation-Centered Approach to Fault Detection in Symmetric Cryptography Ciphers

Luca Breveglieri; Israel Koren; Paolo Maistri

One of the most effective ways of attacking a cryptographic device is by deliberate fault injection during computation, which allows retrieving the secret key with a small number of attempts. Several attacks on symmetric and public-key cryptosystems have been described in the literature and some dedicated error-detection techniques have been proposed to foil them. The proposed techniques are ad hoc ones and exploit specific properties of the cryptographic algorithms. In this paper, we propose a general framework for error detection in symmetric ciphers based on an operation-centered approach. We first enumerate the arithmetic and logic operations included in the cipher and analyze the efficacy and hardware complexity of several error-detecting codes for each such operation. We then recommend an error-detecting code for the cipher as a whole based on the operations it employs. We also deal with the trade-off between the frequency of checking for errors and the error coverage. We demonstrate our framework on a representative group of 11 symmetric ciphers. Our conclusions are supported by both analytical proofs and extensive simulation experiments


defect and fault tolerance in vlsi and nanotechnology systems | 2005

Incorporating error detection and online reconfiguration into a regular architecture for the advanced encryption standard

Luca Breveglieri; Israel Koren; Paolo Maistri

Fault injection based attacks on cryptographic devices aim at recovering the secret keys by inducing an error in the computation process. They are now considered a real threat and countermeasures against them must be taken. In this paper, we describe an extension to an existing AES architecture proposed by Mangard et al. (2003), which provides error detection and fault tolerance by exploiting the high regularity of the architecture. The proposed design is capable of performing online error detection and reconfiguring internal data paths to protect against faults occurring in the computation process. We also describe how different redundancy levels provide protection against different numbers of errors. The presented design incorporating fault detection and tolerance has the same throughput as the base architecture but incurs a nonnegligible area overhead. This overhead is about 40% for the fault detection circuitry and 134% for the entire fault detection and tolerance (through reconfiguration). Although quite high, this overhead is still lower than for reference solutions such as duplication (providing detection) and triple modular redundancy (providing fault masking).


Journal of Cryptology | 2011

Glitch and Laser Fault Attacks onto a Secure AES Implementation on a SRAM-Based FPGA

Gaetan Canivet; Paolo Maistri; Régis Leveugle; Jessy Clédière; Florent Valette; Marc Renaudin

Programmable devices are an interesting alternative when implementing embedded systems on a low-volume scale. In particular, the affordability and the versatility of SRAM-based FPGAs make them attractive with respect to ASIC implementations. FPGAs have thus been used extensively and successfully in many fields, such as implementing cryptographic accelerators. Hardware implementations, however, must be protected against malicious attacks, e.g. those based on fault injections. Protections have been usually evaluated on ASICs, but FPGAs can be vulnerable as well. This work presents thus fault injection attacks against a secured AES architecture implemented on a SRAM-based FPGA. The errors are injected during the computation by means of voltage glitches and laser attacks. To our knowledge, this is one of the first works dealing with dynamic laser fault injections. We show that fault attacks on SRAM-based FPGAs may behave differently with respect to attacks against ASIC, and they need therefore to be addressed by specific countermeasures, that are also discussed in this paper. In addition, we discuss the different effects obtained by the two types of attacks.


application-specific systems, architectures, and processors | 2002

On the propagation of faults and their detection in a hardware implementation of the Advanced Encryption Standard

Guido Bertoni; Luca Breveglieri; Israel Koren; Paolo Maistri; Vincenzo Piuri

High reliability is a desirable property of any implementation of the Advanced Encryption Standard (AES). To achieve high reliability, all possible faults must be detected to avoid the use and transmission of erroneous encrypted/decrypted data. In this paper we first study the behavior of faults which may occur during the encryption and decryption procedures of AES, and the way such faults eventually propagate to the final result. We then describe an appropriate detection technique for these faults. This work extends our preliminary results (G. Bertoni et al, MPCS 2002) by considering more general fault models (e.g., permanent and multiple transient faults), and the possibility of fault masking.


defect and fault tolerance in vlsi and nanotechnology systems | 2003

Detecting and locating faults in VLSI implementations of the Advanced Encryption Standard

Guido Bertoni; Luca Breveglieri; Israel Koren; Paolo Maistri; Vincenzo Piuri

Concurrent fault detection for hardware implementations of the Advanced Encryption Standard (AES) may provide protection against random faults, and against an attacker who may maliciously inject faults in order to find the encryption secret key. We have recently developed such a scheme which is based on the parity code. In this paper we prove that the parity-based code detects all odd-order faults and allows the location of most single transient and permanent faults.


workshop on fault diagnosis and tolerance in cryptography | 2007

A Novel Double-Data-Rate AES Architecture Resistant against Fault Injection

Paolo Maistri; Pierre Vanhauwaert; Régis Leveugle

Several techniques have been proposed for encryption blocks in order to provide protection against faults. These techniques usually exploit some form of redundancy, e.g. by means of error detection codes. However, protection schemes that offer an acceptable error detection rate are in general expensive, while temporal redundancy heavily affects the throughput. In this paper, we propose a new design solution that exploits temporal redundancy by DDR techniques without affecting adversely the throughput at lower clock frequencies. We will also show that the overall costs can be comparable to other solutions recently proposed.

Collaboration


Dive into the Paolo Maistri's collaboration.

Top Co-Authors

Avatar

Régis Leveugle

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar

Israel Koren

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar

Vincent Beroulle

École Normale Supérieure

View shared research outputs
Top Co-Authors

Avatar

Athanasios Papadimitriou

Grenoble Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Pierre Vanhauwaert

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Simon Pontie

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar

Asma Mkhinini

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge