Breaking Fault Attack Countermeasures With Side-Channel Information

被引:0
|
作者
Zheng, Shihui [1 ]
Xing, Ruihao [1 ]
Lai, Junlong [1 ]
Liu, Junkai [1 ]
Wang, Haofeng [1 ]
Ou, Changhai [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
[2] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Hubei, Peoples R China
基金
美国国家科学基金会;
关键词
Encryption; Runtime; Ciphers; Smart cards; Power demand; Correlation coefficient; Transient analysis; Persistent-fault-based collision analysis; redundancy-based countermeasure; error-correction-code based countermeasure; infective countermeasure; side-channel information; fault analysis; CONCURRENT ERROR-DETECTION; CRYPTANALYSIS; SECURE; AES;
D O I
10.1109/TC.2022.3211437
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the persistent fault-based collision attack (PFCA) (Zheng et al. 2021), the adversary captures the information that the intermediate states have collided through identical correct/incorrect ciphertexts. However, fault countermeasures achieve suppression of incorrect ciphertexts and prevent the PFCA. In this paper, we measure the collision of internal states (or state bytes) using side-channel information. First, for round-level countermeasures, we identify state bytes hitting the same persistent fault during the first round of encryption by the shortest runtime. Additionally, we design sliding-window algorithms to automatically identify the runtime of one-round encryptions suitable for different execution environments. Second, for algorithm-level protections, we detect the collision of the internal states after the first round of encryption through the maximum similarity of power consumption traces. Meanwhile, to address the low success rate of key recovery caused by miss detection due to noise within runtime or power consumption, we further revise the original filtering algorithm in PFCA. Third, we implement round-level protected AES on PC to measure runtime, and both AES protected by round-level (or algorithm-level) countermeasures and SM4 (ISO/IEC 2021) protected by a round-level countermeasure on a smart card to collect power consumption. Finally, the experimental result proves that the revised PFCA successfully recovers the key.
引用
收藏
页码:1396 / 1408
页数:13
相关论文
共 50 条
  • [1] Side-channel leakage from sensor-based countermeasures against fault injection attack
    Sugawara, Takeshi
    Shoji, Natsu
    Sakiyama, Kazuo
    Matsuda, Kohei
    Miura, Noriyuki
    Nagata, Makoto
    [J]. MICROELECTRONICS JOURNAL, 2019, 90 : 63 - 71
  • [2] Analysis of Side-Channel Attack Based on Information Theory
    Mizuno, Hiroaki
    Iwai, Keisuke
    Tanaka, Hidema
    Kurokawa, Takakazu
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (07) : 1523 - 1532
  • [3] Improved Side-Channel Resistance by Dynamic Fault-Injection Countermeasures
    Richter-Brockmann, Jan
    Guneysu, Tim
    [J]. 2020 IEEE 31ST INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS (ASAP 2020), 2020, : 117 - 124
  • [4] Plaintext: A missing feature for enhancing the power of deep learning in side-channel analysis? Breaking multiple layers of side-channel countermeasures
    Hoang, Anh-Tuan
    Hanley, Neil
    O’Neill, Maire
    [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (04): : 49 - 85
  • [5] New Fault-Based Side-Channel Attack Using Fault Sensitivity
    Li, Yang
    Ohta, Kazuo
    Sakiyama, Kazuo
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) : 88 - 97
  • [6] A simulated approach to evaluate side-channel attack countermeasures for the Advanced Encryption Standard
    Crocetti, Luca
    Baldanzi, Luca
    Bertolucci, Matteo
    Sarti, Luca
    Carnevale, Berardino
    Fanucci, Luca
    [J]. INTEGRATION-THE VLSI JOURNAL, 2019, 68 : 80 - 86
  • [7] Side-channel attack pitfalls
    Tiri, Kris
    [J]. 2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, : 15 - 20
  • [8] Side-channel information leakage analysis and countermeasures in an embedded CPU microarchitecture
    Chen, Qi
    Zhao, Dongyan
    Liu, Liang
    Yan, Xuesong
    Yuan, Yidong
    Zhang, Xige
    Wu, Hongmei
    Wang, Zhe
    [J]. COMPUTER STANDARDS & INTERFACES, 2022, 80
  • [9] A Study on Information Security Attack based Side-Channel Attacks
    Kang, Young-Jin
    Bruce, Ndibanje
    Park, SuHyun
    Lee, HoonJae
    [J]. 2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 61 - 65
  • [10] Fault Attack Detection in AES by Monitoring Power Side-Channel Statistics
    Shylendra, Ahish
    Shukla, Priyesh
    Bhuma, Swamp
    Trivedi, Amit Ranjan
    [J]. PROCEEDINGS OF THE TWENTYFIRST INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2020), 2020, : 219 - 224