On Clock-Based Fault Analysis Attack for an AES Hardware Using RSL

被引:0
|
作者
Sakiyama, Kazuo [1 ]
Ohta, Kazuo [1 ]
机构
[1] Univ Electrocommun, Dept Informat & Commun Engn, Chofu, Tokyo 1828585, Japan
关键词
fault analysis; random switching logic; AES; clock-based fault analysis attack;
D O I
10.1587/transfun.E93.A.172
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As one of the logic-level countermeasures against DPA (Differential Power Analysis) attacks, Random Switching Logic (RSL) was proposed by Suzuki, Sacki and Ichikawa in 2004 [9]. The RSL technique was applied to AES hardware and a prototype chip was implement with a 0.13-mu m standard CMOS library for evaluating the DPA resistance [10]. Although the main purpose of using RSL is to resist the DPA attacks, our experimental results of Clock-based Fault Analysis (CFA) show that one can reveal the secret information from the prototype chip. This paper explains the mechanism of the CFA attack and discusses the reason for the success of the attack against a prototype implementation of AES with RSL (RSL-AES). Furthermore, we consider an ideal RSL-AES implementation that counteracts the CFA attacks.
引用
收藏
页码:172 / 179
页数:8
相关论文
共 50 条
  • [1] Fault Analysis Attack against an AES Prototype Chip Using RSL
    Sakiyama, Kazuo
    Yagi, Tatsuya
    Ohta, Kazuo
    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 429 - 443
  • [2] Differential fault analysis attack-tolerant hardware implementation of AES
    Anit Kumar Ghosal
    Amit Sardar
    Dipanwita Roy Chowdhury
    The Journal of Supercomputing, 2024, 80 : 4648 - 4681
  • [3] Differential fault analysis attack-tolerant hardware implementation of AES
    Ghosal, Anit Kumar
    Sardar, Amit
    Chowdhury, Dipanwita Roy
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (04): : 4648 - 4681
  • [4] Clock-Based Sender Identification and Attack Detection for Automotive CAN Network
    Zhou, Jia
    Xie, Guoqi
    Yu, Siyang
    Li, Renfa
    IEEE ACCESS, 2021, 9 : 2665 - 2679
  • [5] Template Attack on Masking AES Based on Fault Sensitivity Analysis
    Wang, Qian
    Wang, An
    Wu, Liji
    Qu, Gang
    Zhang, Guoshuang
    2015 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2015, : 96 - 99
  • [6] Clock-based Monitoring for Meaconing Attack on GNSS Receivers and its Physical Evaluation
    Iwamoto, Takashi
    Takewa, Tomoaki
    Tsujita, Wataru
    PROCEEDINGS OF THE 28TH INTERNATIONAL TECHNICAL MEETING OF THE SATELLITE DIVISION OF THE INSTITUTE OF NAVIGATION (ION GNSS+ 2015), 2015, : 3422 - 3425
  • [7] EFFICIENT METHOD FOR RANDOM FAULT ATTACK AGAINST AES HARDWARE IMPLEMENTATION
    Liao, Nan
    Cui, Xiaoxin
    Wang, Tian
    Liao, Kai
    Yu, Dunshan
    Cui, Xiaole
    2016 CHINA SEMICONDUCTOR TECHNOLOGY INTERNATIONAL CONFERENCE (CSTIC), 2016,
  • [8] A Practical Analysis of Fault Attack Countermeasure on AES using Data Masking
    Bae, KiSeok
    Moon, SangJae
    Choi, DooHo
    Choi, YongJe
    Kim, Hyung-Dong
    Ha, JaeCheol
    2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 508 - 513
  • [9] A fault based attack on MDS-AES
    Das, Satyajit
    Bhaumik, Jaydeb
    International Journal of Network Security, 2014, 16 (03) : 193 - 198
  • [10] Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES
    Brisfors, Martin
    Moraitis, Michail
    Dubrova, Elena
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2022, 2023, 13877 : 38 - 53