Skip to main content

Robust and Efficient Approaches to Evaluating Side Channel and Fault Attack Resilience

Objective

Implementing cryptography on embedded devices is an ongoing challenge: every year new implementation flaws are discovered and new attack paths are being used by real life adversaries. Whilst cryptography can guarantee many security properties, it crucially depends on the ability to keep the used keys secret even in face of determined adversaries.
Over the last two decades a new type of adversary has emerged, able to obtain, from the cryptographic implementation, side channel leakage such as recording of response times, power or EM signals, etc. To account for such adversaries, sophisticated security certification and evaluation methods (Common Criteria, EMVCo, FIPS…) have been established to give users assurance that security claims have withstood independent evaluation and testing. Recently the reliability of these evaluations has come into the spotlight: the Taiwanese citizen card proved to be insecure, and Snowden’s revelations about NSA's tampering with FIPS standards eroded public confidence.
REASSURE will (1) improve the efficiency and quality of all aspects of certification using a novel, structured detect-map-exploit approach that will also improve the comparability of independently conducted evaluations, (2) cater for emerging areas such as the IoT by automating leakage assessment practices in order to allow resistance assessment without immediate access to a testing lab, (3) deliver tools to stakeholders, such as reference data sets and an open-source leakage simulator based on instruction-level profiles for a processor relevant for the IoT, (4) improve existing standards by actively pushing the novel results to standardization bodies.
REASSURE's consortium is ideal to tackle such ambitious tasks. It features two major circuits manufacturers (NXP, IDEMIA), a highly respected side channel testing lab (Riscure), an engaged governmental representative (ANSSI), and two of the most prominent research institutions in this field (UCL, University of Bristol).

Call for proposal

H2020-DS-LEIT-2016
See other projects for this call

Coordinator

UNIVERSITE CATHOLIQUE DE LOUVAIN
Address
Place De L Universite 1
1348 Louvain La Neuve
Belgium
Activity type
Higher or Secondary Education Establishments
EU contribution
€ 831 624,61

Participants (7)

UNIVERSITY OF BRISTOL
United Kingdom
EU contribution
€ 518 863,75
Address
Beacon House Queens Road
BS8 1QU Bristol
Activity type
Higher or Secondary Education Establishments
RISCURE BV
Netherlands
EU contribution
€ 749 254,69
Address
Delftechpark 49
2628XJ Delft
Activity type
Private for-profit entities (excluding Higher or Secondary Education Establishments)
SECRETARIAT GENERAL DE LA DEFENSE ET DE LA SECURITE NATIONALE
France
EU contribution
€ 41 250
Address
Boulevard De 51 Bd De Latour Maubourg
75700 Paris 07 Sp
Activity type
Public bodies (excluding Research Organisations and Secondary or Higher Education Establishments)
IDEMIA IDENTITY & SECURITY FRANCE
France
EU contribution
€ 143 566,55
Address
2, Place Samuel De Champlain
92400 Courbevoie
Activity type
Private for-profit entities (excluding Higher or Secondary Education Establishments)
NXP SEMICONDUCTORS GERMANY GMBH
Germany
EU contribution
€ 875 706,66
Address
Troplowitzstrasse 20
22529 Hamburg
Activity type
Private for-profit entities (excluding Higher or Secondary Education Establishments)
IDEMIA FRANCE
France
EU contribution
€ 244 661,24
Address
420 Rue D'estienne D'orves
92700 Colombes
Activity type
Private for-profit entities (excluding Higher or Secondary Education Establishments)
UNIVERSITAET KLAGENFURT
Austria
EU contribution
€ 73 820
Address
Universitaetsstrasse 65-67
9020 Klagenfurt
Activity type
Higher or Secondary Education Establishments