Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers

被引:0
|
作者
Yu Q. [1 ,4 ]
Dong X. [2 ,3 ,6 ,7 ]
Qin L. [3 ,6 ]
Kang Y. [1 ,4 ]
Jia K. [3 ,5 ,6 ]
Wang X. [2 ,3 ,4 ,6 ]
Zhang G. [1 ,4 ,7 ]
机构
[1] School of Cyber Science and Technology, Shandong University, Qingdao
[2] Institute for Advanced Study, BNRist, Tsinghua University, Beijing
[3] BNRist, Tsinghua University, Beijing
[4] Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan
[5] Institute for Network Sciences and Cyberspace, BNRist, Tsinghua University, Beijing
[6] Zhongguancun Laboratory, Beijing
[7] Shandong Institute of Blockchain, Jinan
来源
IACR Transactions on Cryptographic Hardware and Embedded Systems | 2023年 / 2023卷 / 04期
基金
中国国家自然科学基金;
关键词
Automatic search; Differential fault analysis; Meet-in-the-middle;
D O I
10.46586/tches.v2023.i4.1-31
中图分类号
学科分类号
摘要
Fault analysis is a powerful technique to retrieve secret keys by exploiting side-channel information. Differential fault analysis (DFA) is one of the most powerful threats utilizing differential information between correct and faulty ciphertexts and can recover keys for symmetric-key cryptosystems efficiently. Since DFA usually targets the first or last few rounds of the block ciphers, some countermeasures against DFA only protect the first and last few rounds for efficiency. Therefore, to explore how many rounds DFA can affect is very important to make sure how many rounds to protect in practice. At CHES 2011, Derbez et al. proposed an improved DFA on AES based on MitM approach, which covers one more round than previous DFAs. To perform good (or optimal) MitM DFA on block ciphers, the good (or optimal) attack configurations should be identified, such as the location where the faults inject, the matching point with differential relationship, and the two independent computation paths where two independent subsets of the key are involved. In this paper, we formulate the essential ideas of the construction of the attack, and translate the problem of searching for the best MitM DFA into optimization problems under constraints in Mixed-Integer-Linear-Programming (MILP) models. With the models, we achieve more powerful and practical DFA attacks on SKINNY, CRAFT, QARMA, PRINCE, PRINCEv2, and MIDORI with faults injected in 1 to 9 earlier rounds than the best previous DFAs. © 2023, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:1 / 31
页数:30
相关论文
共 50 条
  • [21] Design of fault-resilient S-boxes for AES-like block ciphers
    Maiti, Swapan
    Chowdhury, Dipanwita Roy
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2021, 13 (01): : 71 - 100
  • [22] New criteria for linear maps in AES-like ciphers
    Daemen, Joan
    Rijmen, Vincent
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2009, 1 (01): : 47 - 69
  • [23] Differential Meet-In-The-Middle Cryptanalysis
    Boura, Christina
    David, Nicolas
    Derbez, Patrick
    Leander, Gregor
    Naya-Plasencia, Maria
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT III, 2023, 14083 : 240 - 272
  • [24] Meet-in-the-middle attacks on AES with value constraints
    Dong, Xiaoli
    Liu, Jun
    Wei, Yongzhuang
    Gao, Wen
    Chen, Jie
    DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (09) : 2423 - 2449
  • [25] Looting the LUTs: FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption
    Khairallah, Mustafa
    Chattopadhyay, Anupam
    Peyrin, Thomas
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2017, 2017, 10698 : 282 - 301
  • [26] Differential fault analysis and meet-in-the-middle attack on the block cipher KATAN32
    Zhang W.-Y.
    Liu F.
    Liu X.
    Meng S.
    Journal of Shanghai Jiaotong University (Science), 2013, Shanghai Jiaotong University (18): : 147 - 152
  • [27] Differential Fault Analysis and Meet-in-the-Middle Attack on the Block Cipher KATAN32
    张文英
    刘枫
    刘宣
    孟帅
    JournalofShanghaiJiaotongUniversity(Science), 2013, 18 (02) : 147 - 152
  • [28] DefScan: Provably Defeating Scan Attack on AES-Like Ciphers
    Sao, Yogendra
    Ali, Sk. Subidh
    Mazumdar, Bodhisatwa
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 43 (08) : 2326 - 2339
  • [29] Differential Fault Attack and Meet-in-the-Middle Attack on Block Cipher LED
    Liu, Feng
    Liu, Xuan
    Meng, Shuai
    ADVANCES IN APPLIED SCIENCES AND MANUFACTURING, PTS 1 AND 2, 2014, 850-851 : 529 - 532
  • [30] A New Method for Meet-in-the-Middle Attacks on Reduced AES
    Dong Xiaoli
    Hu Yupu
    Wei Yongzhuang
    Chen Jie
    CHINA COMMUNICATIONS, 2011, 8 (02) : 21 - 25