Free Fault Leakages for Deep Exploitation: Algebraic Persistent Fault Analysis on Lightweight Block Ciphers

被引:0
|
作者
Zhang F. [1 ,2 ,3 ]
Feng T. [1 ,4 ]
Li Z. [1 ]
Ren K. [1 ]
Zhao X. [1 ,5 ]
机构
[1] School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou
[2] State Key Laboratory of Cryptology, P.O.Box 5159, Beijing
[3] Alibaba-Zhejiang University Joint Research Institute of Frontier Technologies, Hangzhou
[4] Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province, Hangzhou
[5] Henan Province Key Laboratory of Cyberspace Situation Awareness, Zhengzhou
基金
中国国家自然科学基金;
关键词
AES; Algebraic; Fault Analysis; Fault Attack; LBlock; LED; PFA; PRESENT; SKINNY;
D O I
10.46586/tches.v2022.i2.289-311
中图分类号
学科分类号
摘要
Persistent Fault Analysis (PFA) is a new fault analysis method for block ciphers proposed in CHES 2018, which utilizes those faults that persist in encryptions. However, one fact that has not been raised enough attention is that: while the fault itself does persist in the entire encryption, the corresponding statistical analysis merely leverages fault leakages in the last one or two rounds, which ignores the valuable leakages in deeper rounds. In this paper, we propose Algebraic Persistent Fault Analysis (APFA), which introduces algebraic analysis to facilitate PFA. APFA tries to make full usage of the free fault leakages in the deeper rounds without incurring additional fault injections. The core idea of APFA is to build similar algebraic constraints for the output of substitution layers and apply the constraints to as many rounds as possible. APFA has many advantages compared to PFA. First, APFA can bypass the manual deductions of round key dependencies along the fault propagation path and transfer the burdens to the computing power of machine solvers such as Crypto-MiniSAT. Second, thanks to the free leakages in the deeper round, APFA requires a much less number of ciphertexts than previous PFA methods, especially for those lightweight block ciphers such as PRESENT, LED, SKINNY, etc. Only 10 faulty ciphertexts are required to recover the master key of SKINNY-64-64, which is about 155 times of reduction as compared to the state-of-the-art result. Third, APFA can be applied to the block ciphers that cannot be analyzed by PFA due to the key size, such as PRESENT-128. Most importantly, APFA replaces statistical analysis with algebraic analysis, which opens a new direction for persistent-fault related researches. © 2022, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:289 / 311
页数:22
相关论文
共 50 条
  • [31] Deep Learning-Based Cryptanalysis of Lightweight Block Ciphers
    So, Jaewoo
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020 (2020)
  • [32] A fault-tolerant pipelined architecture for symmetric block ciphers
    Joo, MK
    Choi, YH
    COMPUTERS & ELECTRICAL ENGINEERING, 2005, 31 (06) : 380 - 390
  • [33] Fault Attack Against Lightweight Block Cipher Based on Cube Analysis
    Huang, Changyang
    Wang, Tao
    Wang, Xiaohan
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 1567 - 1570
  • [34] Performance analysis of CLEFIA and PRESENT lightweight block ciphers
    Jangra, Monika
    Singh, Buddha
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (08): : 1489 - 1499
  • [35] Dependency of lightweight block ciphers over S-boxes : A deep learning based analysis
    Mishra, Girish
    Murthy, S. V. S. S. N. V. G. Krishna
    Pal, S. K.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (01): : 153 - 173
  • [36] Deep-Learning-Based Cryptanalysis of Lightweight Block Ciphers Revisited
    Kim, Hyunji
    Lim, Sejin
    Kang, Yeajun
    Kim, Wonwoong
    Kim, Dukyoung
    Yoon, Seyoung
    Seo, Hwajeong
    ENTROPY, 2023, 25 (07)
  • [37] Dependency of lightweight block ciphers over S-boxes: A deep learning based analysis
    Mishra, Girish
    Murthy, S. V. S. S. N. V. G. Krishna
    Pal, S. K.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021,
  • [38] Temperature-Triggered Hardware Trojan Based Algebraic Fault Analysis of SKINNY-64-64 Lightweight Block Cipher
    Zhu, Lei
    Gong, Jinyue
    Dong, Liang
    Zhang, Cong
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (03): : 5521 - 5537
  • [39] Towards Mixed Structural-functional Models for Algebraic Fault Attacks on Ciphers
    Burchard, Jan
    Ekossono, Ange-Salome Messeng
    Horacek, Jan
    Gay, Mael
    Becker, Bernd
    Schubert, Tobias
    Kreuzer, Martin
    Polian, Ilia
    2017 IEEE 2ND INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2017, : 7 - 12
  • [40] ExploreFault: Identifying Exploitable Fault Models in Block Ciphers with Reinforcement Learning
    Guo, Hao
    Saha, Sayandeep
    Gohil, Vasudev
    Patnaik, Satwik
    Mukhopadhyay, Debdeep
    Rajendran, Jeyavijayan
    2023 60TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC, 2023,