Key Schedule Guided Persistent Fault Attack

被引:0
|
作者
Gong, Xue [1 ]
Zhang, Fan [1 ]
Zhao, Xinjie [1 ]
Xiao, Jie [2 ]
Guo, Shize [3 ]
机构
[1] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310027, Peoples R China
[2] Zhejiang Univ Technol, Coll Comp Sci & Technol, Hangzhou 310027, Peoples R China
[3] Zhejiang Univ, Coll Control Sci & Engn, Hangzhou 310027, Peoples R China
基金
中国国家自然科学基金;
关键词
Circuit faults; Ciphers; Schedules; Three-dimensional displays; Encryption; Transient analysis; Fans; Trojan horses; Time complexity; Synchronization; Key schedule; fault attack; PFA; DES; 3DES; Camellia; LBlock;
D O I
10.1109/TIFS.2024.3495234
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Persistent Fault Analysis (PFA) is a powerful analysis technique proposed in CHES 2018, which utilizes those faults that are injected before execution and persist throughout the encryption. However, when it is applied to the block cipher which has multiple S-boxes, the key cannot be recovered in just one attack. The adversary has to conduct the fault attack several times and inject faults into all the distinct S-boxes. In this paper, we propose Key Schedule Guided Persistent Fault Attack (KGPFA), which utilizes the key schedule to guide the fault injection and fault analysis. By analyzing the key schedule, KGPFA exploits the relations between the key leakages caused by the same faulty S-box in various rounds. It can reduce the number of attacks and the number of faults required to recover the key. Our major contributions are twofold. Firstly, in the fault injection step, we provide Key Schedule Guided Persistent Fault Injection (KGPFI) strategies to reduce the number of attacks and the number of faults under the assumption of both ciphertext-only and known-plaintext attacks. Secondly, in the fault analysis step, as our target ciphers are Feistel-based, we propose the Ineffective Algebraic Persistent Fault Analysis (IAPFA) to extend the usage of Algebraic Persistent Fault Analysis (APFA) in the ineffective persistent fault setting. To demonstrate the effectiveness of our technique, we apply KGPFA to four widely used block ciphers with multiple S-boxes, DES, 3DES, LBlock, and Camellia. In our experiment, in the ciphertext-only attack, the key of DES can be recovered with 300 ineffective ciphertexts (coresponding to 827 ciphertexts) and four faulty S-boxes within 12.18min. Under the assumption of known-plaintext, the key of DES is recovered within two faulty S-boxes in 2.34h. For LBlock, the key is recovered with two faulty S-boxes and 100 ineffective ciphertexts (coresponding to 6211 ciphertexts) in 1.16min.
引用
收藏
页码:767 / 780
页数:14
相关论文
共 50 条
  • [1] An efficient differential fault attack against SIMON key schedule
    Zhang, Jinbao
    Wang, Jiehua
    Bin, Ge
    Li, Jianhua
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 66
  • [2] Persistent fault attack in practice
    Zhang F.
    Zhang Y.
    Jiang H.
    Zhu X.
    Bhasin S.
    Zhao X.
    Liu Z.
    Gu D.
    Ren K.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (02): : 172 - 195
  • [3] Theoretical analysis of persistent fault attack
    Fan ZHANG
    Guorui XU
    Bolin YANG
    Ziyuan LIANG
    Kui REN
    ScienceChina(InformationSciences), 2020, 63 (03) : 234 - 239
  • [4] Theoretical analysis of persistent fault attack
    Zhang, Fan
    Xu, Guorui
    Yang, Bolin
    Liang, Ziyuan
    Ren, Kui
    SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (03)
  • [5] Theoretical analysis of persistent fault attack
    Fan Zhang
    Guorui Xu
    Bolin Yang
    Ziyuan Liang
    Kui Ren
    Science China Information Sciences, 2020, 63
  • [6] Differential Fault Analysis on the Key Schedule of the LBlock Algorithm
    Xiao, Haiyan
    Wang, Lifang
    IEEE ACCESS, 2022, 10 : 62402 - 62411
  • [7] Improved Differential Fault Analysis on AES Key Schedule
    Kim, Chong Hee
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) : 41 - 50
  • [8] An Improved Simple Power Attack against Camellia's Key Schedule
    LIU Shuanggen1
    2. College of Computer Information Engineering
    Wuhan University Journal of Natural Sciences, 2008, (05) : 591 - 594
  • [9] Differential fault analysis on AES key schedule and some countermeasures
    Chen, CN
    Yen, SM
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 118 - 129
  • [10] A Novel Differential Fault Analysis on the Key Schedule of SIMON Family
    Zhang, Jinbao
    Wu, Ning
    Zhou, Fang
    Yahya, Muhammad Rehan
    Li, Jianhua
    ELECTRONICS, 2019, 8 (01)