Practical Improvements to Statistical Ineffective Fault Attacks

被引:0
|
作者
Ege, Baris [1 ]
Swinkels, Bob [1 ]
Toprakhisar, Dilara [2 ]
Vadnala, Praveen Kumar [1 ]
机构
[1] Riscure BV, Delft, Netherlands
[2] Katholieke Univ Leuven, COSIC, Leuven, Belgium
来源
CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2024 | 2024年 / 14595卷
关键词
Fault attacks; SIFA; AES; Chosen plaintext attack; AES;
D O I
10.1007/978-3-031-57543-3_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Statistical Fault Attacks (SFA), introduced by Fuhr et al., exploit the statistical bias resulting from injected faults. Unlike prior fault analysis attacks, which require both faulty and correct ciphertexts under the same key, SFA leverages only faulty ciphertexts. In CHES 2018, more powerful attacks called Statistical Ineffective Fault Attacks (SIFA) have been proposed. In contrast to the previous fault attacks that utilize faulty ciphertexts, SIFA exploits the distribution of the intermediate values leading to fault-free ciphertexts. As a result, the SIFA attacks were shown to be effective even in the presence of widely used fault injection countermeasures based on detection and infection. In this work, we build upon the core idea of SIFA, and provide two main practical improvements over the previously proposed analysis methods. Firstly, we show how to perform SIFA from the input side, which in contrast to the original SIFA, requires injecting faults in the earlier rounds of an encryption or decryption operation. If we consider the start of the operation as the trigger for fault injection, the cumulative jitter in the first few rounds of a cipher is much lower than the last rounds. Hence, performing the attack in the first or second round requires a narrower parameter range for fault injection and hence less fault injection attempts to recover the secret key. Secondly, in comparison to the straightforward SIFA approach of guessing 32-bits at a time, we propose a chosen input approach that reduces the guessing effort to 16-bits at a time. This decreases the key search space for full key recovery of an AES-128 implementation from 2(34) to 2(19).
引用
收藏
页码:59 / 75
页数:17
相关论文
共 50 条
  • [1] On Comparison of Countermeasures against Statistical Ineffective Fault Attacks
    Khairallah, Mustafa
    Bhasin, Shivam
    Abdellatif, Karim M.
    31ST INTERNATIONAL CONFERENCE ON MICROELECTRONICS (IEEE ICM 2019), 2019, : 122 - 125
  • [2] Protecting against statistical ineffective fault attacks
    Daemen J.
    Dobraunig C.
    Eichlseder M.
    Gross H.
    Mendel F.
    Primas R.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (03): : 508 - 543
  • [3] Generalizing Statistical Ineffective Fault Attacks in the Spirit of Side-Channel Attacks
    Barbu, Guillaume
    Castelnovi, Laurent
    Chabrier, Thomas
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2021, 2021, 12910 : 105 - 125
  • [4] Statistical Ineffective Fault Analysis of GIMLI
    Gruber, Michael
    Probst, Matthias
    Tempelmeier, Michael
    PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2020, : 252 - 261
  • [5] A Countermeasure Against Statistical Ineffective Fault Analysis
    Breier, Jakub
    Khairallah, Mustafa
    Hou, Xiaolu
    Liu, Yang
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2020, 67 (12) : 3322 - 3326
  • [6] Statistical Effective Fault Attacks: The Other Side of the Coin
    Vafaei, Navid
    Zarei, Sara
    Bagheri, Nasour
    Eichlseder, Maria
    Primas, Robert
    Soleimany, Hadi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1855 - 1867
  • [7] A Novel Duplication Based Countermeasure to Statistical Ineffective Fault Analysis
    Baksi, Anubhab
    Kumar, Vinay B. Y.
    Karmakar, Banashri
    Bhasin, Shivam
    Saha, Dhiman
    Chattopadhyay, Anupam
    INFORMATION SECURITY AND PRIVACY, ACISP 2020, 2020, 12248 : 525 - 542
  • [8] Reinforcing Lightweight Authenticated Encryption Schemes Against Statistical Ineffective Fault Attack
    Ambili, K. N.
    Jose, Jimmy
    JOURNAL OF CELLULAR AUTOMATA, 2022, 16 (5-6) : 363 - 379
  • [9] Fault attacks on RSA with CRT:: Concrete results and practical countermeasures
    Aumüller, C
    Bier, P
    Fischer, W
    Hofreiter, P
    Seifert, JP
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2002, 2002, 2523 : 260 - 275
  • [10] Practical validation of several fault attacks against the Miller algorithm
    Lashermes, Ronan
    Paindavoine, Marie
    El Mrabet, Nadia
    Fournier, Jacques J. A.
    Goubin, Louis
    2014 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2014), 2014, : 115 - 122