Free Fault Leakages for Deep Exploitation: Algebraic Persistent Fault Analysis on Lightweight Block Ciphers

被引:0
|
作者
Zhang F. [1 ,2 ,3 ]
Feng T. [1 ,4 ]
Li Z. [1 ]
Ren K. [1 ]
Zhao X. [1 ,5 ]
机构
[1] School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou
[2] State Key Laboratory of Cryptology, P.O.Box 5159, Beijing
[3] Alibaba-Zhejiang University Joint Research Institute of Frontier Technologies, Hangzhou
[4] Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province, Hangzhou
[5] Henan Province Key Laboratory of Cyberspace Situation Awareness, Zhengzhou
基金
中国国家自然科学基金;
关键词
AES; Algebraic; Fault Analysis; Fault Attack; LBlock; LED; PFA; PRESENT; SKINNY;
D O I
10.46586/tches.v2022.i2.289-311
中图分类号
学科分类号
摘要
Persistent Fault Analysis (PFA) is a new fault analysis method for block ciphers proposed in CHES 2018, which utilizes those faults that persist in encryptions. However, one fact that has not been raised enough attention is that: while the fault itself does persist in the entire encryption, the corresponding statistical analysis merely leverages fault leakages in the last one or two rounds, which ignores the valuable leakages in deeper rounds. In this paper, we propose Algebraic Persistent Fault Analysis (APFA), which introduces algebraic analysis to facilitate PFA. APFA tries to make full usage of the free fault leakages in the deeper rounds without incurring additional fault injections. The core idea of APFA is to build similar algebraic constraints for the output of substitution layers and apply the constraints to as many rounds as possible. APFA has many advantages compared to PFA. First, APFA can bypass the manual deductions of round key dependencies along the fault propagation path and transfer the burdens to the computing power of machine solvers such as Crypto-MiniSAT. Second, thanks to the free leakages in the deeper round, APFA requires a much less number of ciphertexts than previous PFA methods, especially for those lightweight block ciphers such as PRESENT, LED, SKINNY, etc. Only 10 faulty ciphertexts are required to recover the master key of SKINNY-64-64, which is about 155 times of reduction as compared to the state-of-the-art result. Third, APFA can be applied to the block ciphers that cannot be analyzed by PFA due to the key size, such as PRESENT-128. Most importantly, APFA replaces statistical analysis with algebraic analysis, which opens a new direction for persistent-fault related researches. © 2022, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:289 / 311
页数:22
相关论文
共 50 条
  • [21] Reduction in the Number of Fault Injections for Blind Fault Attack on SPN Block Ciphers
    Li, Yang
    Chen, Mengting
    Liu, Zhe
    Wang, Jian
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (02)
  • [22] Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-Like Block Ciphers
    Patranabis, Sikhar
    Chakraborty, Abhishek
    Mukhopadhyay, Debdeep
    Chakrabarti, Partha Pratim
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (05) : 1092 - 1102
  • [23] A fault-tolerant architecture for symmetric block ciphers
    Joo, MK
    Kim, JH
    Choi, YH
    PROCEEDINGS OF THE 11TH ASIAN TEST SYMPOSIUM (ATS 02), 2002, : 212 - 217
  • [24] XFC: A Framework for eXploitable Fault Characterization in Block Ciphers
    Khanna, Punit
    Rebeiro, Chester
    Hazra, Aritra
    PROCEEDINGS OF THE 2017 54TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2017,
  • [25] An automated framework for exploitable fault identification in block ciphers
    Saha, Sayandeep
    Kumar, Ujjawal
    Mukhopadhyay, Debdeep
    Dasgupta, Pallab
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2019, 9 (03) : 203 - 219
  • [26] Fault diagnosis architecture for SKINNY family of block ciphers
    Nallathambi, Bharathiraja
    Palanivel, Karthigaikumar
    MICROPROCESSORS AND MICROSYSTEMS, 2020, 77
  • [27] An automated framework for exploitable fault identification in block ciphers
    Sayandeep Saha
    Ujjawal Kumar
    Debdeep Mukhopadhyay
    Pallab Dasgupta
    Journal of Cryptographic Engineering, 2019, 9 : 203 - 219
  • [28] Improved fault analysis on SIMECK ciphers
    Le, Duc-Phong
    Lu, Rongxing
    Ghorbani, Ali A.
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2022, 12 (02) : 169 - 180
  • [29] Improved fault analysis on SIMECK ciphers
    Duc-Phong Le
    Rongxing Lu
    Ali A. Ghorbani
    Journal of Cryptographic Engineering, 2022, 12 : 169 - 180
  • [30] A Comparative Analysis of Symmetric Lightweight Block Ciphers
    Poojari, Asmita
    Nagesh, H. R.
    EMERGING TECHNOLOGIES IN DATA MINING AND INFORMATION SECURITY, IEMIS 2018, VOL 1, 2019, 755 : 705 - 711