A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers

被引:42
|
作者
Zhang, Fan [1 ,2 ]
Guo, Shize [3 ]
Zhao, Xinjie [3 ]
Wang, Tao [4 ]
Yang, Jian [5 ]
Standaert, Francois-Xavier [6 ]
Gu, Dawu [7 ]
机构
[1] Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou 310027, Zhejiang, Peoples R China
[2] Sci & Technol Commun Secur Lab, Chengdu 610041, Peoples R China
[3] Inst North Elect Equipment, Beijing 100191, Peoples R China
[4] Ordnance Engn Coll, Dept Informat Engn, Hebei 050003, Peoples R China
[5] Univ Notre Dame, Dept Comp Sci & Engn, Notre Dame, IN 46556 USA
[6] UCL Crypto Grp, B-1348 Louvain La Neuve, Belgium
[7] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
Algebraic fault analysis (AFA); lightweight block cipher; LBlock; CryptoMiniSAT; security evaluation;
D O I
10.1109/TIFS.2016.2516905
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Algebraic fault analysis (AFA), which combines algebraic cryptanalysis with fault attacks, has represented serious threats to the security of lightweight block ciphers. Inspired by an earlier framework for the analysis of side-channel attacks presented at EUROCRYPT 2009, a new generic framework is proposed to analyze and evaluate algebraic fault attacks on lightweight block ciphers. We interpret AFA at three levels: 1) the target; 2) the adversary; and 3) the evaluator. We describe the capability of an adversary in four parts: 1) the fault injector; 2) the fault model describer; 3) the cipher describer; and 4) the machine solver. A formal fault model is provided to cover most of current fault attacks. Different strategies of building optimal equation set are also provided to accelerate the solving process. At the evaluator level, we consider the approximate information metric and the actual security metric. These metrics can be used to guide adversaries, cipher designers, and industrial engineers. To verify the feasibility of the proposed framework, we make a comprehensive study of AFA on an ultra-lightweight block cipher called LBlock. Three scenarios are exploited, which include injecting a fault to encryption, to key scheduling, or modifying the round number or counter. Our best results show that a single fault injection is enough to recover the master key of LBlock within the affordable complexity in each scenario. To verify the generic feature of the proposed framework, we apply AFA to three other block ciphers, i.e., Data Encryption Standard, PRESENT, and Twofish. The results demonstrate that our framework can be used for different ciphers with different structures.
引用
收藏
页码:1039 / 1054
页数:16
相关论文
共 50 条
  • [21] XFC: A Framework for eXploitable Fault Characterization in Block Ciphers
    Khanna, Punit
    Rebeiro, Chester
    Hazra, Aritra
    PROCEEDINGS OF THE 2017 54TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2017,
  • [22] An automated framework for exploitable fault identification in block ciphers
    Saha, Sayandeep
    Kumar, Ujjawal
    Mukhopadhyay, Debdeep
    Dasgupta, Pallab
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2019, 9 (03) : 203 - 219
  • [23] An automated framework for exploitable fault identification in block ciphers
    Sayandeep Saha
    Ujjawal Kumar
    Debdeep Mukhopadhyay
    Pallab Dasgupta
    Journal of Cryptographic Engineering, 2019, 9 : 203 - 219
  • [24] A review of lightweight block ciphers
    George Hatzivasilis
    Konstantinos Fysarakis
    Ioannis Papaefstathiou
    Charalampos Manifavas
    Journal of Cryptographic Engineering, 2018, 8 : 141 - 184
  • [25] Fault-cube attack on SIMON family of lightweight block ciphers
    Ma Y.-F.
    Wang T.
    Chen H.
    Zhang F.
    Lou X.-X.
    Xu L.-M.
    Yang W.-B.
    Wang, Tao (T_Wang_mail@163.com), 1770, Zhejiang University (51): : 1770 - 1779
  • [26] Towards Mixed Structural-functional Models for Algebraic Fault Attacks on Ciphers
    Burchard, Jan
    Ekossono, Ange-Salome Messeng
    Horacek, Jan
    Gay, Mael
    Becker, Bernd
    Schubert, Tobias
    Kreuzer, Martin
    Polian, Ilia
    2017 IEEE 2ND INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2017, : 7 - 12
  • [27] RAFA: Redundancies-assisted Algebraic Fault Analysis and its implementation on SPN block ciphers
    Qiu Z.
    Zhang F.
    Feng T.
    Gong X.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (03): : 570 - 596
  • [28] A review of lightweight block ciphers
    Hatzivasilis, George
    Fysarakis, Konstantinos
    Papaefstathiou, Ioannis
    Manifavas, Charalampos
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2018, 8 (02) : 141 - 184
  • [29] Cache attacks on block ciphers
    Zhao, Xinjie
    Wang, Tao
    Guo, Shize
    Liu, Huiying
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012, 49 (03): : 453 - 468
  • [30] Performance analysis of CLEFIA and PRESENT lightweight block ciphers
    Jangra, Monika
    Singh, Buddha
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (08): : 1489 - 1499