Key Schedule Guided Persistent Fault Attack

被引:0
|
作者
Gong, Xue [1 ]
Zhang, Fan [1 ]
Zhao, Xinjie [1 ]
Xiao, Jie [2 ]
Guo, Shize [3 ]
机构
[1] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310027, Peoples R China
[2] Zhejiang Univ Technol, Coll Comp Sci & Technol, Hangzhou 310027, Peoples R China
[3] Zhejiang Univ, Coll Control Sci & Engn, Hangzhou 310027, Peoples R China
基金
中国国家自然科学基金;
关键词
Circuit faults; Ciphers; Schedules; Three-dimensional displays; Encryption; Transient analysis; Fans; Trojan horses; Time complexity; Synchronization; Key schedule; fault attack; PFA; DES; 3DES; Camellia; LBlock;
D O I
10.1109/TIFS.2024.3495234
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Persistent Fault Analysis (PFA) is a powerful analysis technique proposed in CHES 2018, which utilizes those faults that are injected before execution and persist throughout the encryption. However, when it is applied to the block cipher which has multiple S-boxes, the key cannot be recovered in just one attack. The adversary has to conduct the fault attack several times and inject faults into all the distinct S-boxes. In this paper, we propose Key Schedule Guided Persistent Fault Attack (KGPFA), which utilizes the key schedule to guide the fault injection and fault analysis. By analyzing the key schedule, KGPFA exploits the relations between the key leakages caused by the same faulty S-box in various rounds. It can reduce the number of attacks and the number of faults required to recover the key. Our major contributions are twofold. Firstly, in the fault injection step, we provide Key Schedule Guided Persistent Fault Injection (KGPFI) strategies to reduce the number of attacks and the number of faults under the assumption of both ciphertext-only and known-plaintext attacks. Secondly, in the fault analysis step, as our target ciphers are Feistel-based, we propose the Ineffective Algebraic Persistent Fault Analysis (IAPFA) to extend the usage of Algebraic Persistent Fault Analysis (APFA) in the ineffective persistent fault setting. To demonstrate the effectiveness of our technique, we apply KGPFA to four widely used block ciphers with multiple S-boxes, DES, 3DES, LBlock, and Camellia. In our experiment, in the ciphertext-only attack, the key of DES can be recovered with 300 ineffective ciphertexts (coresponding to 827 ciphertexts) and four faulty S-boxes within 12.18min. Under the assumption of known-plaintext, the key of DES is recovered within two faulty S-boxes in 2.34h. For LBlock, the key is recovered with two faulty S-boxes and 100 ineffective ciphertexts (coresponding to 6211 ciphertexts) in 1.16min.
引用
收藏
页码:767 / 780
页数:14
相关论文
共 50 条
  • [31] Strengthening the key schedule of the AES
    May, L
    Henricksen, M
    Millan, W
    Carter, G
    Dawson, E
    INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 226 - 240
  • [32] Linearity of the AES key schedule
    Armknecht, F
    Lucks, S
    ADVANCED ENCRYPTION STANDARD - AES, 2005, 3373 : 159 - 169
  • [33] Combination and dosing schedule are key
    Gemma K. Alderton
    Nature Reviews Cancer, 2014, 14 (4) : 215 - 215
  • [34] A Fault Attack on ECDSA
    Schmidt, Joern-Marc
    Medwed, Marcel
    PROCEEDINGS OF THE 2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, : 93 - 99
  • [35] Fault Attack on SQIsign
    Lee, Jeonghwan
    Heo, Donghoe
    Kim, Hyeonhak
    Kim, Gyusang
    Kim, Suhri
    Kim, Heeseok
    Hong, Seokhie
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2024, PT II, 2024, 14772 : 54 - 76
  • [36] A Fault Attack on ECDSA
    Schmidt, Joern-Marc
    Medwed, Marcel
    2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, : 93 - 99
  • [37] ATTACK ON KEY WORDS
    LEGGET, RF
    MATERIALS RESEARCH AND STANDARDS, 1965, 5 (05): : 279 - &
  • [38] Scan attacks on side-channel and fault attack resistant public-key implementations
    Da Rolt, Jean
    Das, Amitabh
    Ghosh, Santosh
    Di Natale, Giorgio
    Flottes, Marie-Lise
    Rouzeyre, Bruno
    Verbauwhede, Ingrid
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (04) : 207 - 219
  • [39] Scan attacks on side-channel and fault attack resistant public-key implementations
    Jean Da Rolt
    Amitabh Das
    Santosh Ghosh
    Giorgio Di Natale
    Marie-Lise Flottes
    Bruno Rouzeyre
    Ingrid Verbauwhede
    Journal of Cryptographic Engineering, 2012, 2 (4) : 207 - 219
  • [40] Fault Template Attack Based on Fault Probability
    Wu, Tong
    Zhou, Dawei
    Du, Lei
    Wang, Shiwei
    IEEE ACCESS, 2023, 11 : 71705 - 71713