Practical Improvements to Statistical Ineffective Fault Attacks

被引:0
|
作者
Ege, Baris [1 ]
Swinkels, Bob [1 ]
Toprakhisar, Dilara [2 ]
Vadnala, Praveen Kumar [1 ]
机构
[1] Riscure BV, Delft, Netherlands
[2] Katholieke Univ Leuven, COSIC, Leuven, Belgium
来源
CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2024 | 2024年 / 14595卷
关键词
Fault attacks; SIFA; AES; Chosen plaintext attack; AES;
D O I
10.1007/978-3-031-57543-3_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Statistical Fault Attacks (SFA), introduced by Fuhr et al., exploit the statistical bias resulting from injected faults. Unlike prior fault analysis attacks, which require both faulty and correct ciphertexts under the same key, SFA leverages only faulty ciphertexts. In CHES 2018, more powerful attacks called Statistical Ineffective Fault Attacks (SIFA) have been proposed. In contrast to the previous fault attacks that utilize faulty ciphertexts, SIFA exploits the distribution of the intermediate values leading to fault-free ciphertexts. As a result, the SIFA attacks were shown to be effective even in the presence of widely used fault injection countermeasures based on detection and infection. In this work, we build upon the core idea of SIFA, and provide two main practical improvements over the previously proposed analysis methods. Firstly, we show how to perform SIFA from the input side, which in contrast to the original SIFA, requires injecting faults in the earlier rounds of an encryption or decryption operation. If we consider the start of the operation as the trigger for fault injection, the cumulative jitter in the first few rounds of a cipher is much lower than the last rounds. Hence, performing the attack in the first or second round requires a narrower parameter range for fault injection and hence less fault injection attempts to recover the secret key. Secondly, in comparison to the straightforward SIFA approach of guessing 32-bits at a time, we propose a chosen input approach that reduces the guessing effort to 16-bits at a time. This decreases the key search space for full key recovery of an AES-128 implementation from 2(34) to 2(19).
引用
收藏
页码:59 / 75
页数:17
相关论文
共 50 条
  • [21] An Improved and Efficient Countermeasure against Fault Attacks for AES
    Bedoui, Mouna
    Mestiri, Hassen
    Bouallegue, Belgacem
    Marzougui, Mehrez
    Qayyum, Mohammed
    Machhout, Mohsen
    2017 2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC), 2017, : 209 - 212
  • [22] Fault Attacks on UOV and Rainbow
    Kraemer, Juliane
    Loiero, Mirjam
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 193 - 214
  • [23] Differential Fault Attacks on KLEIN
    Gruber, Michael
    Selmke, Bodo
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 80 - 95
  • [24] On the Duality of Probing and Fault Attacks
    Berndt M. Gammel
    Stefan Mangard
    Journal of Electronic Testing, 2010, 26 : 483 - 493
  • [25] On the Duality of Probing and Fault Attacks
    Gammel, Berndt M.
    Mangard, Stefan
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2010, 26 (04): : 483 - 493
  • [26] It's Not My Fault On - Fault Attacks on Symmetric Cryptography
    Preneel, Bart
    2012 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC), 2012, : 57 - 60
  • [27] Differential Fault Attacks against AES Tampering with the Instruction Flow
    Mella, Silvia
    Melzani, Filippo
    Visconti, Andrea
    2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 439 - 444
  • [28] Compilation of a Countermeasure Against Instruction-Skip Fault Attacks
    Barry, Thierno
    Courousse, Damien
    Robisson, Bruno
    PROCEEDINGS OF THE THIRD WORKSHOP ON CRYPTOGRAPHY AND SECURITY IN COMPUTING SYSTEMS (CS2 2016), 2016, : 1 - 6
  • [29] Fault Attacks Against EMV Signatures
    Coron, Jean-Sebastien
    Naccache, David
    Tibouchi, Mehdi
    TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 208 - +
  • [30] Fault Attacks on Stream Cipher Scream
    Du, Shaoyu
    Zhang, Bin
    Li, Zhenqi
    Lin, Dongdai
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 : 50 - 64