Free Fault Leakages for Deep Exploitation: Algebraic Persistent Fault Analysis on Lightweight Block Ciphers

被引:0
|
作者
Zhang F. [1 ,2 ,3 ]
Feng T. [1 ,4 ]
Li Z. [1 ]
Ren K. [1 ]
Zhao X. [1 ,5 ]
机构
[1] School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou
[2] State Key Laboratory of Cryptology, P.O.Box 5159, Beijing
[3] Alibaba-Zhejiang University Joint Research Institute of Frontier Technologies, Hangzhou
[4] Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province, Hangzhou
[5] Henan Province Key Laboratory of Cyberspace Situation Awareness, Zhengzhou
基金
中国国家自然科学基金;
关键词
AES; Algebraic; Fault Analysis; Fault Attack; LBlock; LED; PFA; PRESENT; SKINNY;
D O I
10.46586/tches.v2022.i2.289-311
中图分类号
学科分类号
摘要
Persistent Fault Analysis (PFA) is a new fault analysis method for block ciphers proposed in CHES 2018, which utilizes those faults that persist in encryptions. However, one fact that has not been raised enough attention is that: while the fault itself does persist in the entire encryption, the corresponding statistical analysis merely leverages fault leakages in the last one or two rounds, which ignores the valuable leakages in deeper rounds. In this paper, we propose Algebraic Persistent Fault Analysis (APFA), which introduces algebraic analysis to facilitate PFA. APFA tries to make full usage of the free fault leakages in the deeper rounds without incurring additional fault injections. The core idea of APFA is to build similar algebraic constraints for the output of substitution layers and apply the constraints to as many rounds as possible. APFA has many advantages compared to PFA. First, APFA can bypass the manual deductions of round key dependencies along the fault propagation path and transfer the burdens to the computing power of machine solvers such as Crypto-MiniSAT. Second, thanks to the free leakages in the deeper round, APFA requires a much less number of ciphertexts than previous PFA methods, especially for those lightweight block ciphers such as PRESENT, LED, SKINNY, etc. Only 10 faulty ciphertexts are required to recover the master key of SKINNY-64-64, which is about 155 times of reduction as compared to the state-of-the-art result. Third, APFA can be applied to the block ciphers that cannot be analyzed by PFA due to the key size, such as PRESENT-128. Most importantly, APFA replaces statistical analysis with algebraic analysis, which opens a new direction for persistent-fault related researches. © 2022, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:289 / 311
页数:22
相关论文
共 50 条
  • [1] A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers
    Zhang, Fan
    Guo, Shize
    Zhao, Xinjie
    Wang, Tao
    Yang, Jian
    Standaert, Francois-Xavier
    Gu, Dawu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (05) : 1039 - 1054
  • [2] Pushing the Limit of PFA: Enhanced Persistent Fault Analysis on Block Ciphers
    Xu, Guorui
    Zhang, Fan
    Yang, Bolin
    Zhao, Xinjie
    He, Wei
    Ren, Kui
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 40 (06) : 1102 - 1116
  • [3] Fault analysis of the PRINCE family of lightweight ciphers
    Kundu, Anup Kumar
    Aikata
    Karmakar, Banashri
    Saha, Dhiman
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2022, 12 (04) : 475 - 494
  • [4] Fault analysis of the PRINCE family of lightweight ciphers
    Anup Kumar Kundu
    Banashri Aikata
    Dhiman Karmakar
    Journal of Cryptographic Engineering, 2022, 12 : 475 - 494
  • [5] Algebraic fault analysis based on decomposition of higher-order nonlinear S-boxes in lightweight block ciphers
    Xing Fang
    Hongxin Zhang
    Xiaotong Cui
    Fan Fan
    Nonlinear Dynamics, 2023, 111 : 12371 - 12388
  • [6] Algebraic fault analysis based on decomposition of higher-order nonlinear S-boxes in lightweight block ciphers
    Fang, Xing
    Zhang, Hongxin
    Cui, Xiaotong
    Fan, Fan
    NONLINEAR DYNAMICS, 2023, 111 (13) : 12371 - 12388
  • [7] Fault-cube attack on SIMON family of lightweight block ciphers
    Ma Y.-F.
    Wang T.
    Chen H.
    Zhang F.
    Lou X.-X.
    Xu L.-M.
    Yang W.-B.
    Wang, Tao (T_Wang_mail@163.com), 1770, Zhejiang University (51): : 1770 - 1779
  • [8] Improved algebraic attacks on lightweight block ciphers
    Yeo, Sze Ling
    Le, Duc-Phong
    Khoo, Khoongming
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2021, 11 (01) : 1 - 19
  • [9] Improved algebraic attacks on lightweight block ciphers
    Sze Ling Yeo
    Duc-Phong Le
    Khoongming Khoo
    Journal of Cryptographic Engineering, 2021, 11 : 1 - 19
  • [10] RAFA: Redundancies-assisted Algebraic Fault Analysis and its implementation on SPN block ciphers
    Qiu Z.
    Zhang F.
    Feng T.
    Gong X.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (03): : 570 - 596