Pushing the Limit of PFA: Enhanced Persistent Fault Analysis on Block Ciphers

被引:5
|
作者
Xu, Guorui [1 ,2 ,3 ]
Zhang, Fan [3 ,4 ]
Yang, Bolin [4 ]
Zhao, Xinjie [5 ]
He, Wei [6 ]
Ren, Kui [3 ,4 ]
机构
[1] Zhejiang Univ, Coll Comp Sci & Technol, Sch Cyber Sci & Technol, Hangzhou 310058, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Alibaba Zhejiang Univ Joint Inst Frontier Technol, Hangzhou 310027, Peoples R China
[4] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 311127, Peoples R China
[5] Inst North Elect Equipment, Beijing 100191, Peoples R China
[6] China Telecom BestPay Co Ltd, Shanghai 200100, Peoples R China
基金
中国国家自然科学基金;
关键词
Circuit faults; Ciphers; Encryption; Light emitting diodes; Statistical analysis; Transient analysis; Analytical models; Advanced encryption standard (AES); fault analysis; fault attack; GPU-accelerated computing; LED; persistent fault analysis (PFA); SKINNY;
D O I
10.1109/TCAD.2020.3048280
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Persistent fault analysis (PFA) is a newly proposed cryptanalysis for block ciphers. Although the injected fault is persistent during the entire encryption, the corresponding analysis is only applied to the last round in the original PFA. In this article, the enhanced PFA (EPFA) is proposed, which can push the limit of PFA by exploiting the fault leakage in deeper rounds and target to reduce the number of required ciphertexts as small as possible. EPFA is first introduced as a general method with a specific application to advanced encryption standard (AES). Then it is extended to other substitution-permutation network (SPN)-based block ciphers, such as LED and SKINNY, both of which have unique features that EPFA fits well. To improve the efficiency of EPFA, a parallel algorithm based on mixed radix numbers is developed, which fully utilizes the power of GPU. Our experimental results show that EPFA can reduce the number of required ciphertexts to be under 1000, which is only about 40% of the 2500 ciphertexts in previous PFA on AES. In contrast to the single-threaded implementation, the parallel EPFA can have a speedup roughly about 200 times.
引用
收藏
页码:1102 / 1116
页数:15
相关论文
共 50 条
  • [1] Free Fault Leakages for Deep Exploitation: Algebraic Persistent Fault Analysis on Lightweight Block Ciphers
    Zhang F.
    Feng T.
    Li Z.
    Ren K.
    Zhao X.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (02): : 289 - 311
  • [2] Reverse-Engineering Secret S-box of Block Ciphers by Persistent Fault
    Wang A.
    Gu R.
    Ding Y.-L.
    Zhang X.
    Yuan Q.-J.
    Zhu L.-H.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (03): : 537 - 551
  • [3] Differential Fault Intensity Analysis on PRESENT and LED Block Ciphers
    Ghalaty, Nahid Farhady
    Yuce, Bilgiday
    Schaumont, Patrick
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2015, 2015, 9064 : 174 - 188
  • [4] Template-Based Fault Injection Analysis of Block Ciphers
    Ghoshal, Ashrujit
    Patranabis, Sikhar
    Mukhopadhyay, Debdeep
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2018, 2018, 11348 : 21 - 36
  • [5] Fully automated differential fault analysis on software implementations of block ciphers
    Hou X.
    Breier J.
    Zhang F.
    Liu Y.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019, 2019 (03): : 1 - 29
  • [6] ExplFrame: Exploiting Page Frame Cache for Fault Analysis of Block Ciphers
    Chakraborty, Anirban
    Bhattacharya, Saran
    Saha, Sayandeep
    Mukhopadhyay, Debdeep
    PROCEEDINGS OF THE 2020 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2020), 2020, : 1303 - 1306
  • [7] A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers
    Zhang, Fan
    Guo, Shize
    Zhao, Xinjie
    Wang, Tao
    Yang, Jian
    Standaert, Francois-Xavier
    Gu, Dawu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (05) : 1039 - 1054
  • [8] Fault Template Attacks on Block Ciphers Exploiting Fault Propagation
    Saha, Sayandeep
    Bag, Arnab
    Roy, Debapriya Basu
    Patranabis, Sikhar
    Mukhopadhyay, Debdeep
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I, 2020, 12105 : 612 - 643
  • [9] Fault analysis of stream ciphers
    Hoch, JJ
    Shamir, A
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 240 - 253
  • [10] A fault-tolerant architecture for symmetric block ciphers
    Joo, MK
    Kim, JH
    Choi, YH
    PROCEEDINGS OF THE 11TH ASIAN TEST SYMPOSIUM (ATS 02), 2002, : 212 - 217