Template Attack on Masking AES Based on Fault Sensitivity Analysis

被引:0
|
作者
Wang, Qian [1 ,2 ]
Wang, An [1 ]
Wu, Liji [1 ]
Qu, Gang [2 ]
Zhang, Guoshuang [3 ]
机构
[1] Tsinghua Univ, Inst Microelect, Beijing 100084, Peoples R China
[2] Univ Maryland, ECE Dept, College Pk, MD 20742 USA
[3] Sci & Technol Informat Assurance Lab, Beijing 100072, Peoples R China
关键词
Fault Sensitivity Analysis; Template Attack; Masking; AES;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fault Sensitivity Analysis (FSA) is an emerging fault based attack that utilizes the sensitive circuit delay information to retrieve keys. However, one of the major limitations of the existing FSA methods is that they are restricted to specific implementation of the AES S-box. In this paper, we introduce the notion of right or wrong collision rate to replace the current Hamming weight model. Based on this, we propose a novel template attack by injecting glitches simultaneously to two parallel S-boxes in AES. The proposed attack is independent of the implementation of the S-boxes. It expands the projections from 8 hamming Weights to 256 different inputs of the S-box. Thus we eliminate the time consuming calculation process in the brute force searching for the same Hamming Weight. We implement the proposed attack and design experiments to verify these claims. Our template based FSA attack successfully breaks the AES algorithm with mask countermeasure. Furthermore, the number of plaintexts and the calculations are reduced in our method.
引用
收藏
页码:96 / 99
页数:4
相关论文
共 50 条
  • [21] A Comprehensive FPGA-Based Assessment on Fault-Resistant AES against Correlation Power Analysis Attack
    Dofe, Jaya
    Pahlevanzadeh, Hoda
    Yu, Qiaoyan
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2016, 32 (05): : 611 - 624
  • [22] On the Need of Randomness in Fault Attack Countermeasures - Application to AES
    Lomne, Victor
    Roche, Thomas
    Thillard, Adrian
    2012 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC), 2012, : 85 - 94
  • [23] A Biased Fault Attack on the Time Redundancy Countermeasure for AES
    Patranabis, Sikhar
    Chakraborty, Abhishek
    Phuong Ha Nguyen
    Mukhopadhyay, Debdeep
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2015, 2015, 9064 : 189 - 203
  • [24] Fault Sensitivity Analysis Meets Zero-Value Attack
    Mischke, Oliver
    Moradi, Amir
    Gueneysu, Tim
    2014 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2014), 2014, : 59 - 67
  • [25] Differential Fault Analysis Against AES Based on a Hybrid Fault Model
    Wan, Xusen
    Zhang, Jinbao
    Wu, Weixiang
    Cheng, Shi
    Wang, Jiehua
    NEURAL INFORMATION PROCESSING, ICONIP 2023, PT IV, 2024, 14450 : 161 - 171
  • [26] Cache based AES attack implementation and its theoretical analysis
    Zhang, Suiyu
    Han, Jun
    Lu, Shiting
    Zeng, Xiaoyang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2011, 48 (06): : 955 - 963
  • [27] Template Attack Against AES in Counter Mode With Unknown Initial Counter
    Tienteu, Marcial
    Smith, Edmund
    Santillan, Edgar Mateos
    Kornegay, Kevin
    Harvey, Paige
    Toutsop, Otily
    Yimer, Tsion
    Morris, Vinton
    Wandji, Ketchiozo
    2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC, 2023, : 525 - 533
  • [28] Key Advantage Template Attack Against AES-128 Algorithm
    Fan H.-P.
    Yuan Q.-J.
    Wang X.-Y.
    Wang Y.-J.
    Wang T.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2020, 48 (10): : 2003 - 2008
  • [29] New Fault-Based Side-Channel Attack Using Fault Sensitivity
    Li, Yang
    Ohta, Kazuo
    Sakiyama, Kazuo
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) : 88 - 97
  • [30] Glitch-Resistant Masking Schemes as Countermeasure Against Fault Sensitivity Analysis
    Arribas, Victor
    De Cnudde, Thomas
    Sijacic, Danilo
    2018 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC), 2018, : 27 - 34