SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers

被引:1
|
作者
Bagheri N. [1 ,2 ]
Sadeghi S. [3 ,4 ]
Ravi P. [5 ]
Bhasin S. [5 ]
Soleimany H. [6 ]
机构
[1] CPS2lab., Shahid Rajaee Teacher Training University, Tehran
[2] School of Computer Science(SCS), Institute for Research in Fundamental Sciences (IPM), Tehran
[3] Department of Mathematics, Institute for Advanced Studies in Basic Sciences (IASBS), Zanjan
[4] Research Center for Basic Sciences and Modern Technologies (RBST), Institute for Advanced Studies in Basic Sciences (IASBS), Zanjan
[5] Temasek Laboratories, NTU
[6] Cyber Research Center, Shahid Beheshti University, Tehran
基金
新加坡国家研究基金会;
关键词
3DES; Camellia; DES; Fault Attack; Feistel Ciphers; Persistent Fault Analysis; Statistical Ineffective Fault Analysis;
D O I
10.46586/tches.v2022.i3.367-390
中图分类号
学科分类号
摘要
Persistent Fault Analysis (PFA) is an innovative and powerful analysis technique in which fault persists throughout the execution. The prior prominent results on PFA were on SPN block ciphers, and the security of Feistel ciphers against this attack has received less attention. In this paper, we introduce a framework to utilize Statistical Ineffective Fault Analysis (SIFA) in the persistent fault setting by proposing Statistical Ineffective Persistent Faults Analysis (SIPFA) that can be efficiently applied to Feistel ciphers in a variety of scenarios. To demonstrate the effectiveness of our technique, we apply SIFPA on three widely used Feistel schemes, DES, 3DES, and Camellia. Our analysis reveals that the secret key of these block ciphers can be extracted with a complexity of at most 250 utilizing a single unknown fault. Furthermore, we demonstrate that the secret can be recovered in a fraction of a second by increasing the adversary’s control over the injected faults. To evaluate SIPFA in a variety of scenarios, we conducted both simulations and real experiments utilizing electromagnetic fault injection on DES and 3DES. © 2022, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:367 / 390
页数:23
相关论文
共 50 条
  • [21] Chosen IV statistical analysis for key recovery attacks on stream ciphers
    Fischer, Simon
    Khazaei, Shahrarn
    Meier, Willi
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 236 - +
  • [22] Analysis of Four Historical Ciphers Against Known Plaintext Frequency Statistical Attack
    Wen, Chuah Chai
    Samylingam, Vivegan A. L.
    Darmawan, Irfan
    Palaniappan, P. Siva Shamala A. P.
    Foozy, Cik Feresa Mohd
    Ramli, Sofia Najwa
    Alawatugoda, Janaka
    INTERNATIONAL JOURNAL OF INTEGRATED ENGINEERING, 2018, 10 (06): : 183 - 192
  • [23] Statistical analysis of multiple intermittent faults in combinational circuits
    AbdElBarr, MH
    Ansari, SI
    INTERNATIONAL JOURNAL OF ELECTRONICS, 1996, 80 (05) : 647 - 660
  • [24] Statistical Analysis of Partial Discharge Faults of HV Cables
    Cheng, Yangchun
    Zhao, Li
    Wu, Xutao
    Ni, Hui
    Ding, Pei
    Li, Xiuguang
    Zhou, Xiu
    2020 IEEE ELECTRICAL INSULATION CONFERENCE (EIC), 2020, : 422 - 425
  • [25] Statistical analysis of tidal stress effect on seismic faults
    Wu, XP
    Mao, W
    Huang, Y
    Jiang, J
    CHINESE JOURNAL OF GEOPHYSICS-CHINESE EDITION, 1999, 42 : 65 - 74
  • [26] Error burst analysis of a statistical self-synchronizing mode of block ciphers
    Heys, Howard M.
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3340 - 3352
  • [27] STATISTICAL-ANALYSIS OF ARRAY PATTERNS AT THE RADIATOR FAULTS
    BEIDER, AB
    IZVESTIYA VYSSHIKH UCHEBNYKH ZAVEDENII RADIOELEKTRONIKA, 1990, 33 (02): : 28 - 33
  • [28] Statistical analysis of delay faults - Theory and efficient computation
    Antreich, K
    Ganz, A
    Tafertshofer, P
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 1997, 51 (03) : 117 - 130
  • [29] Statistical analysis of network traffic for adaptive faults detection
    Hajji, H
    IEEE TRANSACTIONS ON NEURAL NETWORKS, 2005, 16 (05): : 1053 - 1063
  • [30] Free Fault Leakages for Deep Exploitation: Algebraic Persistent Fault Analysis on Lightweight Block Ciphers
    Zhang F.
    Feng T.
    Li Z.
    Ren K.
    Zhao X.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (02): : 289 - 311