Key Schedule Guided Persistent Fault Attack

被引:0
|
作者
Gong, Xue [1 ]
Zhang, Fan [1 ]
Zhao, Xinjie [1 ]
Xiao, Jie [2 ]
Guo, Shize [3 ]
机构
[1] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310027, Peoples R China
[2] Zhejiang Univ Technol, Coll Comp Sci & Technol, Hangzhou 310027, Peoples R China
[3] Zhejiang Univ, Coll Control Sci & Engn, Hangzhou 310027, Peoples R China
基金
中国国家自然科学基金;
关键词
Circuit faults; Ciphers; Schedules; Three-dimensional displays; Encryption; Transient analysis; Fans; Trojan horses; Time complexity; Synchronization; Key schedule; fault attack; PFA; DES; 3DES; Camellia; LBlock;
D O I
10.1109/TIFS.2024.3495234
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Persistent Fault Analysis (PFA) is a powerful analysis technique proposed in CHES 2018, which utilizes those faults that are injected before execution and persist throughout the encryption. However, when it is applied to the block cipher which has multiple S-boxes, the key cannot be recovered in just one attack. The adversary has to conduct the fault attack several times and inject faults into all the distinct S-boxes. In this paper, we propose Key Schedule Guided Persistent Fault Attack (KGPFA), which utilizes the key schedule to guide the fault injection and fault analysis. By analyzing the key schedule, KGPFA exploits the relations between the key leakages caused by the same faulty S-box in various rounds. It can reduce the number of attacks and the number of faults required to recover the key. Our major contributions are twofold. Firstly, in the fault injection step, we provide Key Schedule Guided Persistent Fault Injection (KGPFI) strategies to reduce the number of attacks and the number of faults under the assumption of both ciphertext-only and known-plaintext attacks. Secondly, in the fault analysis step, as our target ciphers are Feistel-based, we propose the Ineffective Algebraic Persistent Fault Analysis (IAPFA) to extend the usage of Algebraic Persistent Fault Analysis (APFA) in the ineffective persistent fault setting. To demonstrate the effectiveness of our technique, we apply KGPFA to four widely used block ciphers with multiple S-boxes, DES, 3DES, LBlock, and Camellia. In our experiment, in the ciphertext-only attack, the key of DES can be recovered with 300 ineffective ciphertexts (coresponding to 827 ciphertexts) and four faulty S-boxes within 12.18min. Under the assumption of known-plaintext, the key of DES is recovered within two faulty S-boxes in 2.34h. For LBlock, the key is recovered with two faulty S-boxes and 100 ineffective ciphertexts (coresponding to 6211 ciphertexts) in 1.16min.
引用
收藏
页码:767 / 780
页数:14
相关论文
共 50 条
  • [21] Fault Attack Resistant Deterministic Random Bit Generator usable for Key Randomization
    Boehl, E.
    Duplys, P.
    2011 IEEE 17TH INTERNATIONAL ON-LINE TESTING SYMPOSIUM (IOLTS), 2011,
  • [22] Recovery for secret key in CTIDH-512 through Fault Injection Attack
    Kim, Hyunju
    Im, Woosang
    Jeong, Sooyong
    Kim, Hyunil
    Seo, Changho
    Kang, Chanku
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 123
  • [23] Recovering Rainbow's Secret Key with a First-Order Fault Attack
    Aulbach, Thomas
    Kovats, Tobias
    Kraemer, Juliane
    Marzougui, Soundes
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2022, 2022, 13503 : 348 - 368
  • [24] Persistent Fault Injection Attack From White-box to Black-box
    Mesbah, Abdelhak
    Mezghiche, Mohamed
    Lanet, Jean-louis
    2017 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING - BOUMERDES (ICEE-B), 2017,
  • [25] On the twofish key schedule
    Schneier, B
    Kelsey, J
    Whiting, D
    Wagner, D
    Hall, C
    Ferguson, N
    SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 27 - 42
  • [26] TREATMENT SCHEDULE FOR AN ATTACK USING ALLOCHRYSINE
    BUSSIERE, JL
    REVUE DU PRATICIEN, 1984, 34 (22): : 1161 - 1161
  • [27] A Provably Secure Scheme to Prevent Master Key Recovery by Fault Attack on AES Hardware
    Swaroopa, Sneha
    Manivannan, Sivappriya
    Chakraborty, Rajat Subhra
    Chakrabarti, Indrajit
    IEEE EMBEDDED SYSTEMS LETTERS, 2024, 16 (04) : 521 - 524
  • [28] Extended Fault Based Attack against Discrete Logarithm Based Public Key Cryptosystems
    Yen, Sung-Ming
    Wu, Chi-Dian
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS AND TECHNOLOGIES (SECURWARE 2011), 2011, : 25 - 30
  • [29] Trojan horse attack free fault-tolerant quantum key distribution protocols
    Yang, Chun-Wei
    Hwang, Tzonelih
    QUANTUM INFORMATION PROCESSING, 2014, 13 (03) : 781 - 794
  • [30] Trojan horse attack free fault-tolerant quantum key distribution protocols
    Hwang, T. (hwangtl@ismail.csie.ncku.edu.tw), 1600, Springer Science and Business Media, LLC (13):