Breaking Fault Attack Countermeasures With Side-Channel Information

被引:0
|
作者
Zheng, Shihui [1 ]
Xing, Ruihao [1 ]
Lai, Junlong [1 ]
Liu, Junkai [1 ]
Wang, Haofeng [1 ]
Ou, Changhai [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
[2] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Hubei, Peoples R China
基金
美国国家科学基金会;
关键词
Encryption; Runtime; Ciphers; Smart cards; Power demand; Correlation coefficient; Transient analysis; Persistent-fault-based collision analysis; redundancy-based countermeasure; error-correction-code based countermeasure; infective countermeasure; side-channel information; fault analysis; CONCURRENT ERROR-DETECTION; CRYPTANALYSIS; SECURE; AES;
D O I
10.1109/TC.2022.3211437
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the persistent fault-based collision attack (PFCA) (Zheng et al. 2021), the adversary captures the information that the intermediate states have collided through identical correct/incorrect ciphertexts. However, fault countermeasures achieve suppression of incorrect ciphertexts and prevent the PFCA. In this paper, we measure the collision of internal states (or state bytes) using side-channel information. First, for round-level countermeasures, we identify state bytes hitting the same persistent fault during the first round of encryption by the shortest runtime. Additionally, we design sliding-window algorithms to automatically identify the runtime of one-round encryptions suitable for different execution environments. Second, for algorithm-level protections, we detect the collision of the internal states after the first round of encryption through the maximum similarity of power consumption traces. Meanwhile, to address the low success rate of key recovery caused by miss detection due to noise within runtime or power consumption, we further revise the original filtering algorithm in PFCA. Third, we implement round-level protected AES on PC to measure runtime, and both AES protected by round-level (or algorithm-level) countermeasures and SM4 (ISO/IEC 2021) protected by a round-level countermeasure on a smart card to collect power consumption. Finally, the experimental result proves that the revised PFCA successfully recovers the key.
引用
收藏
页码:1396 / 1408
页数:13
相关论文
共 50 条
  • [31] Analyzing Side-Channel Attack Vulnerabilities at RTL
    Lai, Xinhui
    Jenihhin, Maksim
    [J]. 2023 IEEE 24TH LATIN AMERICAN TEST SYMPOSIUM, LATS, 2023,
  • [32] Two Operands of Multipliers in Side-Channel Attack
    Sugawara, Takeshi
    Suzuki, Daisuke
    Saeki, Minoru
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2015, 2015, 9064 : 64 - 78
  • [33] Improved algebraic side-channel attack on AES
    Mohamed, Mohamed Saied Emam
    Bulygin, Stanislav
    Zohner, Michael
    Heuser, Annelie
    Walter, Michael
    Buchmann, Johannes
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (03) : 139 - 156
  • [34] A Power Side-Channel Attack on Flash ADC
    Chen, Ziyi
    Savidis, Ioannis
    [J]. 2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS, 2023,
  • [35] ThermalBleed: A Practical Thermal Side-Channel Attack
    Kim, Taehun
    Shin, Youngjoo
    [J]. IEEE ACCESS, 2022, 10 : 25718 - 25731
  • [36] Side-channel Timing Attack of RSA on a GPU
    Luo, Chao
    Fei, Yunsi
    Kaeli, David
    [J]. ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2019, 16 (03)
  • [37] Iterative side-channel cube attack on KeeLoq
    Ma, Yunfei
    Wang, Tao
    Chen, Hao
    Lei, Dong
    [J]. PROCEEDINGS OF 2016 SIXTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2016), 2016, : 53 - 56
  • [38] Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM
    Kundu, Suparna
    Chowdhury, Siddhartha
    Saha, Sayandeep
    Karmakar, Angshuman
    Mukhopadhyay, Debdeep
    Verbauwhede, Ingrid
    [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (02): : 844 - 869
  • [39] Scan attacks on side-channel and fault attack resistant public-key implementations
    Da Rolt, Jean
    Das, Amitabh
    Ghosh, Santosh
    Di Natale, Giorgio
    Flottes, Marie-Lise
    Rouzeyre, Bruno
    Verbauwhede, Ingrid
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (04) : 207 - 219
  • [40] Non-Profiled Side-Channel Assisted Fault Attack: A Case Study on DOMREP
    Saha, Sayandeep
    Ravi, Prasanna
    Jap, Dirmanto
    Bhasin, Shivam
    [J]. 2023 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2023,