A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers

被引:42
|
作者
Zhang, Fan [1 ,2 ]
Guo, Shize [3 ]
Zhao, Xinjie [3 ]
Wang, Tao [4 ]
Yang, Jian [5 ]
Standaert, Francois-Xavier [6 ]
Gu, Dawu [7 ]
机构
[1] Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou 310027, Zhejiang, Peoples R China
[2] Sci & Technol Commun Secur Lab, Chengdu 610041, Peoples R China
[3] Inst North Elect Equipment, Beijing 100191, Peoples R China
[4] Ordnance Engn Coll, Dept Informat Engn, Hebei 050003, Peoples R China
[5] Univ Notre Dame, Dept Comp Sci & Engn, Notre Dame, IN 46556 USA
[6] UCL Crypto Grp, B-1348 Louvain La Neuve, Belgium
[7] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
Algebraic fault analysis (AFA); lightweight block cipher; LBlock; CryptoMiniSAT; security evaluation;
D O I
10.1109/TIFS.2016.2516905
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Algebraic fault analysis (AFA), which combines algebraic cryptanalysis with fault attacks, has represented serious threats to the security of lightweight block ciphers. Inspired by an earlier framework for the analysis of side-channel attacks presented at EUROCRYPT 2009, a new generic framework is proposed to analyze and evaluate algebraic fault attacks on lightweight block ciphers. We interpret AFA at three levels: 1) the target; 2) the adversary; and 3) the evaluator. We describe the capability of an adversary in four parts: 1) the fault injector; 2) the fault model describer; 3) the cipher describer; and 4) the machine solver. A formal fault model is provided to cover most of current fault attacks. Different strategies of building optimal equation set are also provided to accelerate the solving process. At the evaluator level, we consider the approximate information metric and the actual security metric. These metrics can be used to guide adversaries, cipher designers, and industrial engineers. To verify the feasibility of the proposed framework, we make a comprehensive study of AFA on an ultra-lightweight block cipher called LBlock. Three scenarios are exploited, which include injecting a fault to encryption, to key scheduling, or modifying the round number or counter. Our best results show that a single fault injection is enough to recover the master key of LBlock within the affordable complexity in each scenario. To verify the generic feature of the proposed framework, we apply AFA to three other block ciphers, i.e., Data Encryption Standard, PRESENT, and Twofish. The results demonstrate that our framework can be used for different ciphers with different structures.
引用
收藏
页码:1039 / 1054
页数:16
相关论文
共 50 条
  • [31] Further Analysis of Block Ciphers against Timing Attacks
    LI Wei~ 1
    2. State Key Laboratory of Modern Communications
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1629 - 1632
  • [32] Fault-Resilient Lightweight Cryptographic Block Ciphers for Secure Embedded Systems
    Mozaffari-Kermani, Mehran
    Tian, Kai
    Azarderakhsh, Reza
    Bayat-Sarmadi, Siavash
    IEEE EMBEDDED SYSTEMS LETTERS, 2014, 6 (04) : 89 - 92
  • [33] On a certain algebraic property of block ciphers
    Sawada, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (05) : 1130 - 1134
  • [34] A MAC Mode for Lightweight Block Ciphers
    Luykx, Atul
    Preneel, Bart
    Tischhauser, Elmar
    Yasuda, Kan
    FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 43 - 59
  • [35] The Simeck Family of Lightweight Block Ciphers
    Yang, Gangqiang
    Zhu, Bo
    Suder, Valentin
    Aagaard, Mark D.
    Gong, Guang
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 307 - 329
  • [36] On the Key Schedule of Lightweight Block Ciphers
    Huang, Jialin
    Vaudenay, Serge
    Lai, Xuejia
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2014, 2014, 8885 : 124 - 142
  • [37] Algebraic attacks on stream ciphers with linear feedback
    Courtois, NT
    Meier, W
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 345 - 359
  • [38] The SIMON and SPECK lightweight block ciphers
    Beaulieu, Ray
    Shors, Douglas
    Smith, Jason
    Treatman-Clark, Stefan
    Weeks, Bryan
    Wingers, Louis
    2015 52ND ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2015,
  • [39] Applicability of XSL attacks to block ciphers
    Xiao, L
    ELECTRONICS LETTERS, 2003, 39 (25) : 1810 - 1811
  • [40] Performance evaluation of lightweight Block Ciphers in soft-core processor
    Elaguech, Amira
    Kchaou, Afef
    El Hadj Youssef, Wajih
    Ben Othman, Kamel
    Machhout, Mohsen
    2019 19TH INTERNATIONAL CONFERENCE ON SCIENCES AND TECHNIQUES OF AUTOMATIC CONTROL AND COMPUTER ENGINEERING (STA), 2019, : 101 - 105