Fault-Injection Based Chosen-Plaintext Attacks on Multicycle AES Implementations

被引:2
|
作者
Zhong, Yadi [1 ]
Guin, Ujjwal [1 ]
机构
[1] Auburn Univ, Auburn, AL 36849 USA
基金
美国国家科学基金会;
关键词
AES; S-box; fault injection attack; chosen-plaintext attack; CRYPTANALYSIS;
D O I
10.1145/3526241.3530826
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Hardware implementations of cryptographic algorithms offer significantly higher throughput on both encryption and decryption than their software counterparts. Advanced Encryption Standard (AES) is a widely used symmetric block cipher for data encryption. The most commonly used architecture for AES hardware implementations is the multicycle design, where each round uses the same hardware resource multiple times to increase area efficiency. In this paper, we successfully decouple the interdependency of multiple key bytes from the AES encryption. Thus, we solve each key byte separately with an overall attack complexity in O(2(8)). Moreover, we uniquely determine each key byte through a chosen set of three plaintext-ciphertext pairs. We propose two novel chosen-plaintext attacks on multicycle AES implementations. Both attacks can eliminate the key diffusion from the MixColumns and Key Schedule modules. The first attack takes advantage of vulnerable AES implementations where an adversary can observe the output of each round. The second attack is based on fault injection, where a single fault on the completion-indicator register is sufficient to launch the attack. Because no faults are injected in the internal computations of AES, the current fault detection mechanisms are bypassed as no intermediate result has been altered. Lastly, we explore the theoretical aspect for the inherent property of our attacks.
引用
收藏
页码:443 / 448
页数:6
相关论文
共 50 条
  • [1] Chosen-plaintext linear attacks on Serpent
    Huang, Jialin
    Lai, Xuejia
    [J]. IET INFORMATION SECURITY, 2013, 7 (04) : 293 - 299
  • [2] Adaptive Chosen-Plaintext Collision Attack on Masked AES in Edge Computing
    Ding, Yaoling
    Shi, Ying
    Wang, An
    Zheng, Xuexin
    Wang, Zongyue
    Zhang, Guoshuang
    [J]. IEEE ACCESS, 2019, 7 : 63217 - 63229
  • [3] Bit-policy based chosen-plaintext collision attack on reused-mask AES?
    Zhang, Meiling
    Wang, Liusheng
    Zhao, Bingyu
    Zheng, Dong
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 68
  • [4] Chaotic Encryption Algorithm Against Chosen-Plaintext Attacks in Optical OFDM Transmission
    Yang, Xuelin
    Shen, Zanwei
    Hu, Xiaonan
    Hu, Weisheng
    [J]. IEEE PHOTONICS TECHNOLOGY LETTERS, 2016, 28 (22) : 2499 - 2502
  • [5] A novel data dependent multimedia encryption algorithm secure against chosen-plaintext attacks
    Koh, Min-Sung
    Rodriguez-Marek, Esteban
    Talarico, Claudio
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 1527 - 1530
  • [6] Physical Layer Encryption Algorithm for Chaotic Optical OFDM Transmission against Chosen-Plaintext Attacks
    Yang, Xuelin
    Shen, Zanwei
    Hu, Xiaonan
    Hu, Weisheng
    [J]. 2016 18TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS (ICTON), 2016,
  • [7] On the one-wayness against chosen-plaintext attacks of the Loidreau's modified McEliece PKC
    Kobara, K
    Imai, H
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (12) : 3160 - 3168
  • [8] Chosen-plaintext cryptanalysis of a clipped-neural-network-based chaotic cipher
    Li, CQ
    Li, SJ
    Zhang, D
    Chen, GR
    [J]. ADVANCES IN NEURAL NETWORKS - ISNN 2005, PT 2, PROCEEDINGS, 2005, 3497 : 630 - 636
  • [9] On the security of gyrator transform-based image encryption by chosen-plaintext attack
    Sang, Jun
    Alam, Mohammad. S.
    Cai, Bin
    [J]. OPTICAL PATTERN RECOGNITION XXVII, 2016, 9845
  • [10] Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware
    Kumar, Raghavan
    Jovanovic, Philipp
    Burleson, Wayne
    Polian, Ilia
    [J]. 2014 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2014), 2014, : 18 - 28