A Combined Power and Fault Analysis Attack on Protected Grain Family of Stream Ciphers

被引:10
|
作者
Chakraborty, Abhishek [1 ]
Mazumdar, Bodhisatwa [1 ]
Mukhopadhyay, Debdeep [1 ]
机构
[1] Indian Inst Technol Kharagpur, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
关键词
Clock glitch; differential power analysis; fault attack countermeasures; Grain stream cipher; least squares support vector machine (LS-SVM); SASEBO-GII board;
D O I
10.1109/TCAD.2017.2666601
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Differential fault analysis of stream ciphers, such as Grain (Grain v1 and Grain-128) has been an active area of research. Several countermeasures to thwart such analysis have been also proposed in the related cryptographic literature. In this paper, we demonstrate a novel combination of power and fault analysis strategies to devise attacks against such protected implementations of Grain stream cipher. We considered clock glitch induced faults occurring in practice to construct our fault model. In addition, we developed a generic power analysis attack technique against the Grain family of stream ciphers assuming that the cipher implementation can be resynchronized multiple times with a fixed secret key and any randomly generated initialization vector. Subsequently, we combine our proposed power analysis strategy with the notion of the practically occurring faults to mount attacks on various fault attack countermeasures. In order to validate our proposed power analysis attack, we report the results of power trace classifications of a Grain v1 implementation on SASEBO-GII board. The captured power traces were analyzed using least squares support vector machine learning algorithm-based multiclass classifiers to segregate the power traces into the respective Hamming distance (HD) classes. To extract power samples with high information about HD classes, signal-to-noise ratio (SNR) metric was chosen for feature selection. The experimental results of power trace classifications of test set showed success rate as high as 92.5% when the seven largest SNR sample instants over a clock cycle were chosen as features along with a suitable kernel hyperparameter combination.
引用
收藏
页码:1968 / 1977
页数:10
相关论文
共 50 条
  • [1] A Differential Fault Attack on the Grain Family of Stream Ciphers
    Banik, Subhadeep
    Maitra, Subhamoy
    Sarkar, Santanu
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2012, 2012, 7428 : 122 - 139
  • [2] A Fault Attack on the Family of Enocoro Stream Ciphers
    Danner, Julian
    Kreuzer, Martin
    [J]. CRYPTOGRAPHY, 2021, 5 (04)
  • [3] A differential fault attack on the WG family of stream ciphers
    Orumiehchiha, Mohammad Ali
    Rostami, Saeed
    Shakour, Elham
    Pieprzyk, Josef
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (02) : 189 - 195
  • [4] A Probabilistic Algebraic Attack on the Grain Family of Stream Ciphers
    Datta, Pratish
    Roy, Dibyendu
    Mukhopadhyay, Sourav
    [J]. NETWORK AND SYSTEM SECURITY, 2014, 8792 : 558 - 565
  • [5] A differential fault attack on the WG family of stream ciphers
    Mohammad Ali Orumiehchiha
    Saeed Rostami
    Elham Shakour
    Josef Pieprzyk
    [J]. Journal of Cryptographic Engineering, 2020, 10 : 189 - 195
  • [6] Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers
    Mazumdar, Bodhisatwa
    Mukhopadhyay, Debdeep
    Sengupta, Indranil
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2015, 7 (01): : 35 - 69
  • [7] Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers
    Bodhisatwa Mazumdar
    Debdeep Mukhopadhyay
    Indranil Sengupta
    [J]. Cryptography and Communications, 2015, 7 : 35 - 69
  • [8] Correlation Power Analysis Attack against Synchronous Stream Ciphers
    Wu, Keke
    Li, Huiyun
    Peng, Bo
    Yu, Fengqi
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2067 - +
  • [9] Fault analysis of stream ciphers
    Hoch, JJ
    Shamir, A
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 240 - 253
  • [10] New Key Recovery Attack on the MICKEY Family of Stream Ciphers
    Ding, Lin
    Gu, Dawu
    Wang, Lei
    [J]. FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 239 - 249