Practical Improvements to Statistical Ineffective Fault Attacks

被引:0
|
作者
Ege, Baris [1 ]
Swinkels, Bob [1 ]
Toprakhisar, Dilara [2 ]
Vadnala, Praveen Kumar [1 ]
机构
[1] Riscure BV, Delft, Netherlands
[2] Katholieke Univ Leuven, COSIC, Leuven, Belgium
来源
CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2024 | 2024年 / 14595卷
关键词
Fault attacks; SIFA; AES; Chosen plaintext attack; AES;
D O I
10.1007/978-3-031-57543-3_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Statistical Fault Attacks (SFA), introduced by Fuhr et al., exploit the statistical bias resulting from injected faults. Unlike prior fault analysis attacks, which require both faulty and correct ciphertexts under the same key, SFA leverages only faulty ciphertexts. In CHES 2018, more powerful attacks called Statistical Ineffective Fault Attacks (SIFA) have been proposed. In contrast to the previous fault attacks that utilize faulty ciphertexts, SIFA exploits the distribution of the intermediate values leading to fault-free ciphertexts. As a result, the SIFA attacks were shown to be effective even in the presence of widely used fault injection countermeasures based on detection and infection. In this work, we build upon the core idea of SIFA, and provide two main practical improvements over the previously proposed analysis methods. Firstly, we show how to perform SIFA from the input side, which in contrast to the original SIFA, requires injecting faults in the earlier rounds of an encryption or decryption operation. If we consider the start of the operation as the trigger for fault injection, the cumulative jitter in the first few rounds of a cipher is much lower than the last rounds. Hence, performing the attack in the first or second round requires a narrower parameter range for fault injection and hence less fault injection attempts to recover the secret key. Secondly, in comparison to the straightforward SIFA approach of guessing 32-bits at a time, we propose a chosen input approach that reduces the guessing effort to 16-bits at a time. This decreases the key search space for full key recovery of an AES-128 implementation from 2(34) to 2(19).
引用
收藏
页码:59 / 75
页数:17
相关论文
共 50 条
  • [31] Synthesis of Fault Attacks on Cryptographic Implementations
    Barthe, Gilles
    Dupressoir, Francois
    Fouque, Pierre-Alain
    Gregoire, Benjamin
    Zapalowicz, Jean-Christophe
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1016 - 1027
  • [32] An Efficient AES 32-Bit Architecture Resistant to Fault Attacks
    Mestiri, Hassen
    Barraj, Imen
    Mohamed, Abdullah Alsir
    Machhout, Mohsen
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (02): : 3667 - 3683
  • [33] Securing the AES Cryptographic Circuit Against Both Power and Fault Attacks
    Zhang, Jinbao
    Wu, Ning
    Zhou, Fang
    Ge, Fen
    Zhang, Xiaoqiang
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2019, 14 (05) : 2171 - 2180
  • [34] Securing the AES Cryptographic Circuit Against Both Power and Fault Attacks
    Jinbao Zhang
    Ning Wu
    Fang Zhou
    Fen Ge
    Xiaoqiang Zhang
    Journal of Electrical Engineering & Technology, 2019, 14 : 2171 - 2180
  • [35] Research on a Random Mask Infection Countermeasure against Double Fault Attacks
    Wu, Weixiang
    Wan, Xusen
    Zhang, Jinbao
    Cheng, Shi
    APPLIED SCIENCES-BASEL, 2023, 13 (22):
  • [36] A Statistical Fault Analysis Methodology for the Ascon Authenticated Cipher
    Ramezanpour, Keyvan
    Ampadu, Paul
    Diehl, William
    PROCEEDINGS OF THE 2019 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2019, : 41 - 50
  • [37] Preventing Fault Attacks Using Fault Randomization with a Case Study on AES
    Ghosh, Shamit
    Saha, Dhiman
    Sengupta, Abhrajit
    Chowdhury, Dipanwita Roy
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 343 - 355
  • [38] SCADFA: Combined SCA plus DFA Attacks on Block Ciphers with Practical Validations
    Patranabis, Sikhar
    Datta, Nilanjan
    Jap, Dirmanto
    Breier, Jakub
    Bhasin, Shivam
    Mukhopadhyay, Debdeep
    IEEE TRANSACTIONS ON COMPUTERS, 2019, 68 (10) : 1498 - 1510
  • [39] Fault Attacks, Injection Techniques and Tools for Simulation
    Piscitelli, Roberta
    Bhasin, Shivam
    Regazzoni, Francesco
    2015 10TH IEEE INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA (DTIS), 2015,
  • [40] Theoretical differential fault attacks on FLIP and FiLIP
    Meaux, Pierrick
    Roy, Dibyendu
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2024, 16 (04): : 721 - 744