Template Attack on Masking AES Based on Fault Sensitivity Analysis

被引:0
|
作者
Wang, Qian [1 ,2 ]
Wang, An [1 ]
Wu, Liji [1 ]
Qu, Gang [2 ]
Zhang, Guoshuang [3 ]
机构
[1] Tsinghua Univ, Inst Microelect, Beijing 100084, Peoples R China
[2] Univ Maryland, ECE Dept, College Pk, MD 20742 USA
[3] Sci & Technol Informat Assurance Lab, Beijing 100072, Peoples R China
关键词
Fault Sensitivity Analysis; Template Attack; Masking; AES;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fault Sensitivity Analysis (FSA) is an emerging fault based attack that utilizes the sensitive circuit delay information to retrieve keys. However, one of the major limitations of the existing FSA methods is that they are restricted to specific implementation of the AES S-box. In this paper, we introduce the notion of right or wrong collision rate to replace the current Hamming weight model. Based on this, we propose a novel template attack by injecting glitches simultaneously to two parallel S-boxes in AES. The proposed attack is independent of the implementation of the S-boxes. It expands the projections from 8 hamming Weights to 256 different inputs of the S-box. Thus we eliminate the time consuming calculation process in the brute force searching for the same Hamming Weight. We implement the proposed attack and design experiments to verify these claims. Our template based FSA attack successfully breaks the AES algorithm with mask countermeasure. Furthermore, the number of plaintexts and the calculations are reduced in our method.
引用
收藏
页码:96 / 99
页数:4
相关论文
共 50 条
  • [41] A Practical Fault Induction Attack against an FPGA Implementation of AES Cryptosystem
    Momeni, Hamed
    Masoumi, Massoud
    Dehghan, Ali
    2013 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2013, : 134 - +
  • [42] A High-Efficient Fault Attack on AES S-box
    Liao, Nan
    Cui, Xiaoxin
    Wang, Tian
    Liao, Kai
    Yu, Dunshan
    Cui, Xiaole
    2016 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2016, : 210 - 215
  • [43] Timing Attack Analysis on AES on Modern Processors
    Kaushik, Prakhar
    Majumdar, Rana
    2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 462 - 465
  • [44] Power Analysis Attack of an AES GPU Implementation
    Chao Luo
    Yunsi Fei
    Liwei Zhang
    A. Adam Ding
    Pei Luo
    Saoni Mukherjee
    David Kaeli
    Journal of Hardware and Systems Security, 2018, 2 (1) : 69 - 82
  • [45] Security Analysis of the Masking-Shuffling based Side Channel Attack Countermeasures
    Cho, Jong-Won
    Han, Dong-Guk
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (04): : 207 - 213
  • [46] Fault Analysis of Infective AES Computations
    Battistello, Alberto
    Giraud, Christophe
    2013 10TH WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2013), 2013, : 101 - 107
  • [47] Advanced Fault Analysis Techniques on AES
    Sakiyama, Kazuo
    Machida, Takanori
    Matsubara, Arisa
    2015 IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC), 2015, : 230 - 234
  • [48] An Extension of Differential Fault Analysis on AES
    Li, Wei
    Wang, Yong
    Gu, Dawu
    Li, Juanru
    Liu, Zhiqiang
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 443 - +
  • [49] Cache based remote timing attack on the AES
    Aciicmez, Onur
    Schindler, Werner
    Koc, Cetin K.
    TOPICS IN CRYPTOLOGY - CT-RSA 2007, PROCEEDINGS, 2007, 4377 : 271 - +
  • [50] Revisiting the security of static masking and compaction: Discovering new vulnerability and Improved Scan Attack on AES
    Sao, Yogendra
    Pandian, K. K. Soundra
    Ali, Sk Subidh
    PROCEEDINGS OF THE 2020 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2020,