Remote fault injection attack against cryptographic modules via intentional electromagnetic interference from an antenna

被引:0
作者
Hikaru Nishiyama [1 ]
Daisuke Fujimoto [1 ]
Yuichi Hayashi [1 ]
机构
[1] Nara Institute of Science and Technology, Ikoma
基金
日本科学技术振兴机构; 日本学术振兴会;
关键词
Differential fault analysis (DFA); Electromagnetic shielding; Fault injection attack; Intentional electromagnetic interference (IEMI);
D O I
10.1007/s13389-025-00370-y
中图分类号
学科分类号
摘要
Fault injection attacks on cryptographic modules pose significant threats. However, conventional fault injection methods typically require physical access to the target device. This study proposes a novel fault injection method utilizing intentional electromagnetic interference (IEMI) to induce temporary faults in cryptographic modules without intrusion, proximity, or synchronization with the encryption process. The proposed method carefully selected a frequency that could induce faults sorely in the target cryptographic modules without disrupting other modules in the device. Furthermore, faults suitable for secret key analysis were efficiently generated even when EM waves were injected asynchronously into the cryptographic operation. To demonstrate the effectiveness of the proposed method, an experiment was conducted in which EM waves were irradiated from an antenna positioned 2 m from a cryptographic device with an advanced encryption standard (AES) implementation, inducing faults. The secret key was successfully retrieved by applying differential fault analysis (DFA) to the obtained faulty ciphertexts. In addition, the fault occurrence mechanism was elucidated by monitoring the electrical variations in the cryptographic module caused by IEMI. The proposed method can be applied to devices previously believed to be immune to fault injection attack threats owing to challenges associated with conventional scenarios. This suggests a wider range of applicability for addressing security concerns in such devices. Consequently, even devices already in circulation could become susceptible to these threats, highlighting the need to implement measures to protect such equipment against potential attacks. In our strategy to counteract this threat, we suggest and showcase the capability to significantly reduce the transmission efficiency of EM waves by broadening the concept of EM shielding. This, in turn, significantly decreases the occurrence rate of faults. Finally, we delve into the applicability of the proposed fault injection method to different secret key analysis methods and the limitations of the method in alternative attack scenarios. © The Author(s) 2025.
引用
收藏
相关论文
共 2 条
  • [1] Remote Fault Injection Attack against Cryptographic Modules via Intentional Electromagnetic Interference from an Antenna
    Nishiyama, Hikaru
    Fujimoto, Daisuke
    Hayashi, Yuichi
    PROCEEDINGS OF THE 2023 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY, ASHES 2023, 2023, : 92 - 101
  • [2] Side-channel leakage from sensor-based countermeasures against fault injection attack
    Sugawara, Takeshi
    Shoji, Natsu
    Sakiyama, Kazuo
    Matsuda, Kohei
    Miura, Noriyuki
    Nagata, Makoto
    MICROELECTRONICS JOURNAL, 2019, 90 : 63 - 71