Breaking Fault Attack Countermeasures With Side-Channel Information

被引:0
|
作者
Zheng, Shihui [1 ]
Xing, Ruihao [1 ]
Lai, Junlong [1 ]
Liu, Junkai [1 ]
Wang, Haofeng [1 ]
Ou, Changhai [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
[2] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Hubei, Peoples R China
基金
美国国家科学基金会;
关键词
Encryption; Runtime; Ciphers; Smart cards; Power demand; Correlation coefficient; Transient analysis; Persistent-fault-based collision analysis; redundancy-based countermeasure; error-correction-code based countermeasure; infective countermeasure; side-channel information; fault analysis; CONCURRENT ERROR-DETECTION; CRYPTANALYSIS; SECURE; AES;
D O I
10.1109/TC.2022.3211437
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the persistent fault-based collision attack (PFCA) (Zheng et al. 2021), the adversary captures the information that the intermediate states have collided through identical correct/incorrect ciphertexts. However, fault countermeasures achieve suppression of incorrect ciphertexts and prevent the PFCA. In this paper, we measure the collision of internal states (or state bytes) using side-channel information. First, for round-level countermeasures, we identify state bytes hitting the same persistent fault during the first round of encryption by the shortest runtime. Additionally, we design sliding-window algorithms to automatically identify the runtime of one-round encryptions suitable for different execution environments. Second, for algorithm-level protections, we detect the collision of the internal states after the first round of encryption through the maximum similarity of power consumption traces. Meanwhile, to address the low success rate of key recovery caused by miss detection due to noise within runtime or power consumption, we further revise the original filtering algorithm in PFCA. Third, we implement round-level protected AES on PC to measure runtime, and both AES protected by round-level (or algorithm-level) countermeasures and SM4 (ISO/IEC 2021) protected by a round-level countermeasure on a smart card to collect power consumption. Finally, the experimental result proves that the revised PFCA successfully recovers the key.
引用
收藏
页码:1396 / 1408
页数:13
相关论文
共 50 条
  • [21] Timing Side-channel Attacks and Countermeasures in CPU Microarchitectures
    Zhang, Jiliang
    Chen, Congcong
    Cui, Jinhua
    Li, Keqin
    [J]. ACM COMPUTING SURVEYS, 2024, 56 (07)
  • [22] Side-channel Attacks and Countermeasures in Cloud Services and Infrastructures
    Albalawi, Abdullah
    Vassilakis, Vassilios
    Calinescu, Radu
    [J]. PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022,
  • [23] KeeLoq and Side-Channel Analysis - Evolution of an Attack
    Paar, Christof
    Eisenbarth, Thomas
    Kasper, Markus
    Kasper, Timo
    Moradi, Amir
    [J]. PROCEEDINGS OF THE 2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, : 65 - 69
  • [24] Side-Channel Attack on a Protected RFID Card
    Xu, Rixin
    Zhu, Liehuang
    Wang, An
    Du, Xiaojiang
    Choo, Kim-Kwang Raymond
    Zhang, Guoshuang
    Gai, Keke
    [J]. IEEE ACCESS, 2018, 6 : 58395 - 58404
  • [25] A Timing Side-Channel Attack on a Mobile GPU
    Karimi, Elmira
    Jiang, Zhen Hang
    Fei, Yunsi
    Kaeli, David
    [J]. 2018 IEEE 36TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2018, : 67 - 74
  • [26] Side-Channel Attack on Flipped Scan Chains
    Wang, Sying-Jyan
    Choi, Ting-Jui
    Li, Katherine Shu-Min
    [J]. 2016 IEEE 25TH ASIAN TEST SYMPOSIUM (ATS), 2016, : 67 - 72
  • [27] Irradiation Side-Channel Attack on Cryptographic Chip
    Qu, Ming
    Chang, Yuchun
    [J]. PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCE ON INTEGRATED CIRCUITS AND MICROSYSTEMS (ICICM), 2016, : 41 - 45
  • [28] A Power Side-Channel Attack on Flash ADC
    Chen, Ziyi
    Savidis, Ioannis
    [J]. 2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS, 2023,
  • [29] ThermalBleed: A Practical Thermal Side-Channel Attack
    Kim, Taehun
    Shin, Youngjoo
    [J]. IEEE ACCESS, 2022, 10 : 25718 - 25731
  • [30] Side-channel Timing Attack of RSA on a GPU
    Luo, Chao
    Fei, Yunsi
    Kaeli, David
    [J]. ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2019, 16 (03)