Persistent fault attack in practice

被引:0
|
作者
Zhang F. [1 ,2 ,4 ]
Zhang Y. [1 ,3 ,4 ]
Jiang H. [5 ]
Zhu X. [5 ]
Bhasin S. [6 ]
Zhao X. [7 ]
Liu Z. [2 ,8 ]
Gu D. [9 ]
Ren K. [1 ,4 ]
机构
[1] College of Computer Science and Technology, Zhejiang University, Hangzhou
[2] State Key Laboratory of Cryptology, P.O.Box 5159, Beijing
[3] College of Information Science & Electronic Engineering, Zhejiang University, Hangzhou
[4] Alibaba-Zhejiang University Joint Research Institute of Frontier Technologies, Hangzhou
[5] Chinese Academy of Sciences, Beijing
[6] Institute of North Electronic Equipment, Beijing
[7] Nanjing University of Aeronautics and Astronautics, Nanjing
[8] Shanghai Jiaotong University, Shanghai
基金
中国国家自然科学基金;
关键词
AES; Fault Injection; MLE; PFA; PRESENT; SRAM;
D O I
10.13154/tches.v2020.i2.172-195
中图分类号
学科分类号
摘要
Persistence fault analysis (PFA) is a novel fault analysis technique proposed in CHES 2018 and demonstrated with rowhammer-based fault injections. However, whether such analysis can be applied to traditional fault attack scenario, together with its difficulty in practice, has not been carefully investigated. For the first time, a persistent fault attack is conducted on an unprotected AES implemented on ATmega163L microcontroller in this paper. Several critical challenges are solved with our new improvements, including (1) how to decide whether the fault is injected in SBox; (2) how to use the maximum likelihood estimation to pursue the minimum number of ciphertexts; (3) how to utilize the unknown fault in SBox to extract the key. Our experiments show that: to break AES with physical laser injections despite all these challenges, the minimum and average number of required ciphertexts are 926 and 1641, respectively. It is about 38% and 28% reductions of the ciphertexts required in comparison to 1493 and 2273 in previous work where both fault value and location have to be known. Furthermore, our analysis is extended to the PRESENT cipher. By applying the persistent fault analysis to the penultimate round, the full PRESENT key of 80 bits can be recovered. Eventually, an experimental validation is performed to confirm the accuracy of our attack with more insights. This paper solves the challenges in most aspects of practice and also demonstrates the feasibility and universality of PFA on SPN block ciphers. © 2020, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:172 / 195
页数:23
相关论文
共 50 条
  • [1] Theoretical analysis of persistent fault attack
    Fan ZHANG
    Guorui XU
    Bolin YANG
    Ziyuan LIANG
    Kui REN
    ScienceChina(InformationSciences), 2020, 63 (03) : 234 - 239
  • [2] Theoretical analysis of persistent fault attack
    Zhang, Fan
    Xu, Guorui
    Yang, Bolin
    Liang, Ziyuan
    Ren, Kui
    SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (03)
  • [3] Theoretical analysis of persistent fault attack
    Fan Zhang
    Guorui Xu
    Bolin Yang
    Ziyuan Liang
    Kui Ren
    Science China Information Sciences, 2020, 63
  • [4] Key Schedule Guided Persistent Fault Attack
    Gong, Xue
    Zhang, Fan
    Zhao, Xinjie
    Xiao, Jie
    Guo, Shize
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 767 - 780
  • [5] Instruction-Fetching Attack and Practice in Collision Fault Attack on AES
    Jiang, Huilong
    Zhu, Xiang
    Han, Jianwei
    SYMMETRY-BASEL, 2022, 14 (10):
  • [6] A Fast-Detection and Fault-Correction Algorithm against Persistent Fault Attack
    Cheng, Yukun
    Zheng, Mengce
    Huang, Fan
    Zhang, Jiajia
    Hu, Honggang
    Yu, Nenghai
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 557 - 568
  • [7] Persistent Fault Injection Attack From White-box to Black-box
    Mesbah, Abdelhak
    Mezghiche, Mohamed
    Lanet, Jean-louis
    2017 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING - BOUMERDES (ICEE-B), 2017,
  • [8] A Fault Attack on ECDSA
    Schmidt, Joern-Marc
    Medwed, Marcel
    PROCEEDINGS OF THE 2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, : 93 - 99
  • [9] Fault Attack on SQIsign
    Lee, Jeonghwan
    Heo, Donghoe
    Kim, Hyeonhak
    Kim, Gyusang
    Kim, Suhri
    Kim, Heeseok
    Hong, Seokhie
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2024, PT II, 2024, 14772 : 54 - 76
  • [10] A Fault Attack on ECDSA
    Schmidt, Joern-Marc
    Medwed, Marcel
    2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, : 93 - 99