Practical Improvements to Statistical Ineffective Fault Attacks

被引:0
|
作者
Ege, Baris [1 ]
Swinkels, Bob [1 ]
Toprakhisar, Dilara [2 ]
Vadnala, Praveen Kumar [1 ]
机构
[1] Riscure BV, Delft, Netherlands
[2] Katholieke Univ Leuven, COSIC, Leuven, Belgium
来源
CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2024 | 2024年 / 14595卷
关键词
Fault attacks; SIFA; AES; Chosen plaintext attack; AES;
D O I
10.1007/978-3-031-57543-3_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Statistical Fault Attacks (SFA), introduced by Fuhr et al., exploit the statistical bias resulting from injected faults. Unlike prior fault analysis attacks, which require both faulty and correct ciphertexts under the same key, SFA leverages only faulty ciphertexts. In CHES 2018, more powerful attacks called Statistical Ineffective Fault Attacks (SIFA) have been proposed. In contrast to the previous fault attacks that utilize faulty ciphertexts, SIFA exploits the distribution of the intermediate values leading to fault-free ciphertexts. As a result, the SIFA attacks were shown to be effective even in the presence of widely used fault injection countermeasures based on detection and infection. In this work, we build upon the core idea of SIFA, and provide two main practical improvements over the previously proposed analysis methods. Firstly, we show how to perform SIFA from the input side, which in contrast to the original SIFA, requires injecting faults in the earlier rounds of an encryption or decryption operation. If we consider the start of the operation as the trigger for fault injection, the cumulative jitter in the first few rounds of a cipher is much lower than the last rounds. Hence, performing the attack in the first or second round requires a narrower parameter range for fault injection and hence less fault injection attempts to recover the secret key. Secondly, in comparison to the straightforward SIFA approach of guessing 32-bits at a time, we propose a chosen input approach that reduces the guessing effort to 16-bits at a time. This decreases the key search space for full key recovery of an AES-128 implementation from 2(34) to 2(19).
引用
收藏
页码:59 / 75
页数:17
相关论文
共 50 条
  • [41] PSS Is Secure against Random Fault Attacks
    Coron, Jean-Sebastien
    Mandal, Avradip
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 653 - 666
  • [42] Optical Fault Attacks on AES: A Threat in Violet
    Schmidt, Joern-Marc
    Hutter, Michael
    Plos, Thomas
    PROCEEDINGS OF THE 2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, : 13 - 22
  • [43] Remote and Stealthy Fault Attacks on Virtualized FPGAs
    Krautter, Jonas
    Gnad, Dennis R. E.
    Tahoori, Mehdi B.
    PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), 2021, : 1632 - 1637
  • [44] Hardware Designer's Guide to Fault Attacks
    Karaklajic, Dusko
    Schmidt, Joern-Marc
    Verbauwhede, Ingrid
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2013, 21 (12) : 2295 - 2306
  • [45] A Survey on Fault Attacks on Symmetric Key Cryptosystems
    Baksi, Anubhab
    Bhasin, Shivam
    Breier, Jakub
    Jap, Dirmanto
    Saha, Dhiman
    ACM COMPUTING SURVEYS, 2023, 55 (04)
  • [46] Optical Fault Attacks on AES: A Threat in Violet
    Schmidt, Joern-Marc
    Hutter, Michael
    Plos, Thomas
    2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, : 13 - 22
  • [47] A survey of fault attacks in pairing based cryptography
    Nadia El Mrabet
    Jacques J. A. Fournier
    Louis Goubin
    Ronan Lashermes
    Cryptography and Communications, 2015, 7 : 185 - 205
  • [48] Implementation and Comparative Analysis of the Fault Attacks on AES
    Raza, Saleem
    Saqib, Malik Najmus
    Shakeel, Azfar
    Khan, Majid Iqbal
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (06) : 625 - 634
  • [49] Fault Attacks Friendliness of Post -quantum Cryptosystems
    Barenghi, Alessandro
    Pelosi, Gerardo
    2023 WORKSHOP ON FAULT DETECTION AND TOLERANCE IN CRYPTOGRAPHY, FDTC 2023, 2023, : XII - XII
  • [50] Hardware Countermeasures Benchmarking against Fault Attacks
    Potestad-Ordonez, Francisco Eugenio
    Tena-Sanchez, Erica
    Acosta-Jimenez, Antonio Jose
    Jimenez-Fernandez, Carlos Jesus
    Chaves, Ricardo
    APPLIED SCIENCES-BASEL, 2022, 12 (05):