Fault-Injection Based Chosen-Plaintext Attacks on Multicycle AES Implementations

被引:2
|
作者
Zhong, Yadi [1 ]
Guin, Ujjwal [1 ]
机构
[1] Auburn Univ, Auburn, AL 36849 USA
基金
美国国家科学基金会;
关键词
AES; S-box; fault injection attack; chosen-plaintext attack; CRYPTANALYSIS;
D O I
10.1145/3526241.3530826
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Hardware implementations of cryptographic algorithms offer significantly higher throughput on both encryption and decryption than their software counterparts. Advanced Encryption Standard (AES) is a widely used symmetric block cipher for data encryption. The most commonly used architecture for AES hardware implementations is the multicycle design, where each round uses the same hardware resource multiple times to increase area efficiency. In this paper, we successfully decouple the interdependency of multiple key bytes from the AES encryption. Thus, we solve each key byte separately with an overall attack complexity in O(2(8)). Moreover, we uniquely determine each key byte through a chosen set of three plaintext-ciphertext pairs. We propose two novel chosen-plaintext attacks on multicycle AES implementations. Both attacks can eliminate the key diffusion from the MixColumns and Key Schedule modules. The first attack takes advantage of vulnerable AES implementations where an adversary can observe the output of each round. The second attack is based on fault injection, where a single fault on the completion-indicator register is sufficient to launch the attack. Because no faults are injected in the internal computations of AES, the current fault detection mechanisms are bypassed as no intermediate result has been altered. Lastly, we explore the theoretical aspect for the inherent property of our attacks.
引用
收藏
页码:443 / 448
页数:6
相关论文
共 50 条
  • [21] Fault based collision attacks on AES
    Bloemer, Johannes
    Krummel, Volker
    [J]. FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY, PROCEEDINGS, 2006, 4236 : 106 - 120
  • [22] A Novel Countermeasure Against Fault Injection Attacks for AES-Based Cryptosystems
    Mirzaeyan, Ali
    Patooghy, Ahmad
    Fazeli, Mehdi
    [J]. 2016 24TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2016, : 1148 - 1153
  • [23] AccHashtag: Accelerated Hashing for Detecting Fault-Injection Attacks on Embedded Neural Networks
    Javaheripi, Mojan
    Chang, Jung-Woo
    Koushanfar, Farinaz
    [J]. ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2023, 19 (01)
  • [24] Secure Systolic Montgomery Modular Multiplier Resilient to Hardware Trojan and Fault-Injection Attacks
    Yang, Qi
    Qin, Zhongping
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (CITS), 2013,
  • [25] FAUST: FAUlt-injection script-based tool
    Benso, A
    Di Carlo, S
    Di Natale, G
    Prinetto, P
    Solcia, I
    Tagliaferri, L
    [J]. 9TH IEEE INTERNATIONAL ON-LINE TESTING SYMPOSIUM, PROCEEDINGS, 2003, : 160 - 160
  • [26] A Low-Cost Approach to Crack Python']Python CAPTCHAs Using AI-Based Chosen-Plaintext Attack
    Yu, Ning
    Darling, Kyle
    [J]. APPLIED SCIENCES-BASEL, 2019, 9 (10):
  • [27] Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA
    Rauzy, Pablo
    Guilley, Sylvain
    [J]. 2014 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2014), 2014, : 68 - 82
  • [28] HASHTAG: Hash Signatures for Online Detection of Fault-Injection Attacks on Deep Neural Networks
    Javaheripi, Mojan
    Koushanfar, Farinaz
    [J]. 2021 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN (ICCAD), 2021,
  • [29] Secure Multipliers Resilient to Strong Fault-Injection Attacks Using Multilinear Arithmetic Codes
    Wang, Zhen
    Karpovsky, Mark
    Joshi, Ajay
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2012, 20 (06) : 1036 - 1048
  • [30] (In)security against fault injection attacks for CRT-RSA implementations
    Berzati, Alexandre
    Canovas, Cecile
    Goubin, Louis
    [J]. FDTC 2008: FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY, PROCEEDINGS, 2008, : 101 - +