One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-like Block Ciphers

被引:16
作者
Patranabis, Sikhar [1 ]
Mukhopadhyay, Debdeep [1 ]
Breier, Jakub [2 ]
Bhasin, Shivam [2 ]
机构
[1] IIT Kharagpur, Dept CSE, Kharagpur, W Bengal, India
[2] NTU Singapore, Temasek Labs, Singapore, Singapore
来源
2017 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC) | 2017年
关键词
DFA; DPA; PRESENT; combined attacks; fault attacks; side-channel analysis; bit-permutation;
D O I
10.1109/FDTC.2017.11
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present the first practically realizable side-channel assisted fault attack on PRESENT, that can retrieve the last round key efficiently using single nibble faults. The attack demonstrates how side-channel leakage can allow the adversary to precisely determine the fault mask resulting from a nibble fault injection instance. We first demonstrate the viability of such an attack model via side-channel analysis experiments on top of a laser-based fault injection setup, targeting a PRESENT-80 implementation on an ATmega328P microcontroller. Subsequently, we present a differential fault analysis (DFA) exploiting the knowledge of the output fault mask in the target round to recover multiple last round key nibbles independently and in parallel. Both analytically and through experimental evidence, we show that the combined attack can recover the last round key of PRESENT with 4 random nibble fault injections in the best case, and around 78 nibble fault injections in the average case. Our attack sheds light on a hitherto unexplored vulnerability of PRESENT and PRESENT-like block ciphers that use bit-permutations instead of maximum distance separable (MDS) layers for diffusion.
引用
收藏
页码:25 / 32
页数:8
相关论文
共 20 条
  • [1] Agoyan M, 2010, LECT NOTES COMPUT SC, V6035, P182, DOI 10.1007/978-3-642-12510-2_13
  • [2] [Anonymous], 2014, LECT NOTES COMPUTER, DOI DOI 10.1007/978-3-319-16363-5_6
  • [3] New differential fault analysis on PRESENT
    Bagheri, Nasour
    Ebrahimpour, Reza
    Ghaedi, Navid
    [J]. EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2013,
  • [4] Banik S., 2017, CRYPT HARDW EMB SYST
  • [5] A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA
    Barenghi, Alessandro
    Bertoni, Guido M.
    Breveglieri, Luca
    Pelosi, Gerardo
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (07) : 1864 - 1878
  • [6] Bogdanov A, 2007, LECT NOTES COMPUT SC, V4727, P450
  • [7] Multiple Fault Attack on PRESENT with a Hardware Trojan Implementation in FPGA
    Breier, Jakub
    He, Wei
    [J]. 2015 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT), 2015, : 58 - 64
  • [8] Clavier Christophe, 2010, Proceedings of the 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2010), P10, DOI 10.1109/FDTC.2010.17
  • [9] Combined Fault and Side-Channel Attacks on the AES Key Schedule
    Dassance, Francois
    Venelli, Alexandre
    [J]. 2012 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC), 2012, : 63 - 71
  • [10] Electromagnetic Transient Faults Injection on a hardware and a software implementations of AES
    Dehbaoui, Amine
    Dutertre, Jean-Max
    Robisson, Bruno
    Tria, Assia
    [J]. 2012 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC), 2012, : 7 - 15