Fault-Assisted Side-Channel Analysis of Masked Implementations

被引:0
作者
Yao, Yuan [1 ]
Yang, Mo [1 ]
Patrick, Conor [1 ]
Yuce, Bilgiday [1 ]
Schaumont, Patrick [1 ]
机构
[1] Virginia Tech, Bradley Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
来源
PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST) | 2018年
基金
美国国家科学基金会;
关键词
Masked Implementation; Fault attack; Side-Channel Attack; AES; RISC-V;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Masking is a side-channel countermeasure technique that uses random masks to split sensitive cryptographic variables into multiple shares. The side-channel leakage from individual shares does not reveal the sensitive variable because the random masks are secret. We propose a methodology to identify the generation and integration of random masks in cryptographic software by means of side-channel analysis. We then disable the randomizing effect of masking by targeted fault injection, and we break the masking countermeasure using first-order side-channel analysis. This attack is practically demonstrated on a RISC-V core for two different masked AES software implementations. We achieve full key recovery using 300 traces and 230 traces for a byte-level masked AES and a bit-sliced masked AES implementation respectively. The proposed attack methodology is independent of the cryptographic kernel. It targets the transfer of random masks into the masked cryptographic algorithm. This paper highlights the vulnerability of random number generation in masked implementations.
引用
收藏
页码:57 / 64
页数:8
相关论文
共 20 条
  • [1] Amiel F, 2006, LECT NOTES COMPUT SC, V4236, P223
  • [2] Barenghi A., 2010, 5 WORKSH EMB SYST SE, P1
  • [3] Berker E., RECOMMENDATION RANDO
  • [4] Biham E, 1997, LECT NOTES COMPUT SC, V1267, P260
  • [5] Masking does not protect against differential fault attacks
    Boscher, Arnaud
    Handschuh, Helena
    [J]. FDTC 2008: FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY, PROCEEDINGS, 2008, : 35 - +
  • [6] Cnudde T., 2016, IACR CRYPTOLOGY EPRI, V2016, P631
  • [7] A Multiple-Fault Injection Attack by Adaptive Timing Control Under Black-Box Conditions and a Countermeasure
    Endo, Sho
    Homma, Naofumi
    Hayashi, Yu-ichi
    Takahashi, Junko
    Fuji, Hitoshi
    Aoki, Takafumi
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, 2014, 8622 : 214 - 228
  • [8] Gro H., 2016, IACR Cryptol. ePrint Arch, P486
  • [9] Private circuits: Securing hardware against probing attacks
    Ishai, Y
    Sahai, A
    Wagner, D
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 463 - 481
  • [10] Käsper E, 2009, LECT NOTES COMPUT SC, V5747, P1