Skip to main content

2019 | OriginalPaper | Buchkapitel

5. An Automated Framework for Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers

verfasst von : Fan Zhang, Bolin Yang, Shize Guo, Xinjie Zhao, Tao Wang, Francois-Xavier Standaert, Dawu Gu

Erschienen in: Automated Methods in Cryptographic Fault Analysis

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Algebraic fault analysis (AFA), which combines algebraic cryptanalysis with fault attacks, has represented serious threats to the security of lightweight block ciphers. Inspired by an earlier framework for the analysis of side-channel attacks presented at EUROCRYPT 2009, a new generic framework is proposed to analyze and evaluate algebraic fault attacks on lightweight block ciphers. We interpret AFA at three levels: the target, the adversary, and the evaluator. We describe the capability of an adversary in four parts: the fault injector, the fault model describer, the cipher describer, and the machine solver. A formal fault model is provided to cover most of the current fault attacks. Different strategies of building optimal equation set are also provided to accelerate the solving process. At the evaluator level, we consider the approximate information metric and the actual security metric. These metrics can be used to guide adversaries, cipher designers, and industrial engineers. To verify the feasibility of the proposed framework, we make a comprehensive study of AFA on an ultra-lightweight block cipher called LBlock. Three scenarios are exploited which include injecting a fault to encryption, to key scheduling, or modifying the round number or counter. Our best results show that a single fault injection is enough to recover the master key of LBlock within the affordable complexity in each scenario.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, C. Whelan, The Sorcerer’s apprentice guide to fault attacks. Proc. IEEE 94(2), 370–382 (2006)CrossRef H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, C. Whelan, The Sorcerer’s apprentice guide to fault attacks. Proc. IEEE 94(2), 370–382 (2006)CrossRef
2.
Zurück zum Zitat E. Biham, A. Shamir, Differential fault analysis of secret key cryptosystems, in B.S. Kaliski Jr. (eds.), Advances in Cryptology - CRYPTO ’97. Lecture Notes in Computer Science, vol. 1294 (Springer, Berlin, 1997), pp. 513–525 E. Biham, A. Shamir, Differential fault analysis of secret key cryptosystems, in B.S. Kaliski Jr. (eds.), Advances in Cryptology - CRYPTO ’97. Lecture Notes in Computer Science, vol. 1294 (Springer, Berlin, 1997), pp. 513–525
3.
Zurück zum Zitat A. Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J. Robshaw, Y. Seurin, C. Vikkelsoe, PRESENT: an ultra-lightweight block cipher, in Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ’07 (Springer, Berlin, 2007), pp. 450–466MATH A. Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J. Robshaw, Y. Seurin, C. Vikkelsoe, PRESENT: an ultra-lightweight block cipher, in Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ’07 (Springer, Berlin, 2007), pp. 450–466MATH
4.
Zurück zum Zitat M. Cazorla, K. Marquet, M. Minier, Survey and benchmark of lightweight block ciphers for wireless sensor networks, in SECRYPT (2013), pp. 543–548 M. Cazorla, K. Marquet, M. Minier, Survey and benchmark of lightweight block ciphers for wireless sensor networks, in SECRYPT (2013), pp. 543–548
5.
Zurück zum Zitat H. Chen, L. Fan, Integral based fault attack on LBlock, in ICISC (2014), pp. 227–240 H. Chen, L. Fan, Integral based fault attack on LBlock, in ICISC (2014), pp. 227–240
6.
Zurück zum Zitat H. Choukri, M. Tunstall, Round reduction using faults, in FDTC (2015), pp. 13–24 H. Choukri, M. Tunstall, Round reduction using faults, in FDTC (2015), pp. 13–24
7.
Zurück zum Zitat N.T. Courtois, J. Pieprzyk, Cryptanalysis of block ciphers with overdefined systems of equations, in Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), Queenstown, December 2002 (Springer, Berlin, 2002), pp. 267–287 N.T. Courtois, J. Pieprzyk, Cryptanalysis of block ciphers with overdefined systems of equations, in Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), Queenstown, December 2002 (Springer, Berlin, 2002), pp. 267–287
8.
Zurück zum Zitat N.T. Courtois, K. Jackson, D. Ware, Fault-algebraic attacks on inner rounds of des, in e-Smart’10 Proceedings: The Future of Digital Security Technologies (Strategies Telecom and Multimedia, Montreuil, 2010) N.T. Courtois, K. Jackson, D. Ware, Fault-algebraic attacks on inner rounds of des, in e-Smart’10 Proceedings: The Future of Digital Security Technologies (Strategies Telecom and Multimedia, Montreuil, 2010)
9.
Zurück zum Zitat A. Dehbaoui, A.-P. Mirbaha, N. Moro, J.-M. Dutertre, A. Tria, Electromagnetic glitch on the AES round counter, in International Workshop on Constructive Side-Channel Analysis and Secure Design (Springer, Berlin, 2013), pp. 17–31 A. Dehbaoui, A.-P. Mirbaha, N. Moro, J.-M. Dutertre, A. Tria, Electromagnetic glitch on the AES round counter, in International Workshop on Constructive Side-Channel Analysis and Secure Design (Springer, Berlin, 2013), pp. 17–31
10.
Zurück zum Zitat D. Dinu, Y. Le Corre, D. Khovratovich, L. Perrin, J. Großschädl, A. Biryukov, Triathlon of lightweight block ciphers for the internet of things. J. Cryptogr. Eng. 209, 1–20 (2015) D. Dinu, Y. Le Corre, D. Khovratovich, L. Perrin, J. Großschädl, A. Biryukov, Triathlon of lightweight block ciphers for the internet of things. J. Cryptogr. Eng. 209, 1–20 (2015)
11.
Zurück zum Zitat K. Jeong, C. Lee, J.I. Lim, Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2013(151), 1–9 (2013) K. Jeong, C. Lee, J.I. Lim, Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2013(151), 1–9 (2013)
12.
Zurück zum Zitat P. Jovanovic, M. Kreuzer, I. Polian, An algebraic fault attack on the LED block cipher. IACR Cryptol. ePrint Archive 2012, 400 (2012)MATH P. Jovanovic, M. Kreuzer, I. Polian, An algebraic fault attack on the LED block cipher. IACR Cryptol. ePrint Archive 2012, 400 (2012)MATH
13.
Zurück zum Zitat L. Knudsen, C. Miolane, Counting equations in algebraic attacks on block ciphers. Int. J. Inf. Secur. 9(2), 127–135 (2010)CrossRef L. Knudsen, C. Miolane, Counting equations in algebraic attacks on block ciphers. Int. J. Inf. Secur. 9(2), 127–135 (2010)CrossRef
14.
Zurück zum Zitat W. Li, J. Zhao, X. Zhao, J. Zhu, Algebraic fault analysis on LBlock under nibble-based fault model, in IMCCC (2013), pp. 1525–1529 W. Li, J. Zhao, X. Zhao, J. Zhu, Algebraic fault analysis on LBlock under nibble-based fault model, in IMCCC (2013), pp. 1525–1529
15.
Zurück zum Zitat NIST, Data encryption standard. Federal Information Processing Standards Publications, May 1977 NIST, Data encryption standard. Federal Information Processing Standards Publications, May 1977
16.
Zurück zum Zitat B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson, Twofish: A 128-bit block cipher. NIST AES Proposal, 15 June 1998 B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson, Twofish: A 128-bit block cipher. NIST AES Proposal, 15 June 1998
17.
Zurück zum Zitat F.-X. Standaert, T. Malkin, M. Yung, A unified framework for the analysis of side-channel key recovery attacks, in EUROCRYPT (2009), pp. 443–461 F.-X. Standaert, T. Malkin, M. Yung, A unified framework for the analysis of side-channel key recovery attacks, in EUROCRYPT (2009), pp. 443–461
18.
Zurück zum Zitat W. Wu, L. Zhang, LBlock: a lightweight block cipher, in ACNS (2011), pp. 327–344 W. Wu, L. Zhang, LBlock: a lightweight block cipher, in ACNS (2011), pp. 327–344
19.
Zurück zum Zitat F. Zhang, X. Zhao, S. Guo, T. Wang, Z. Shi, Improved algebraic fault analysis: a case study on piccolo and applications to other lightweight block ciphers, in Proceedings of the 4th International Workshop Constructive Side-Channel Analysis Secure Design (COSADE), Paris, March 2013 (Springer, Berlin, 2013), pp. 62–79 F. Zhang, X. Zhao, S. Guo, T. Wang, Z. Shi, Improved algebraic fault analysis: a case study on piccolo and applications to other lightweight block ciphers, in Proceedings of the 4th International Workshop Constructive Side-Channel Analysis Secure Design (COSADE), Paris, March 2013 (Springer, Berlin, 2013), pp. 62–79
20.
Zurück zum Zitat L. Zhao, T. Nishide, K. Sakurai, Differential fault analysis of full LBlock, in COSADE (2012), pp. 135–150 L. Zhao, T. Nishide, K. Sakurai, Differential fault analysis of full LBlock, in COSADE (2012), pp. 135–150
21.
Zurück zum Zitat X. Zhao, S. Guo, F. Zhang, T. Wang, Z. Shi, K. Ji, Algebraic differential fault attacks on LED using a single fault injection, in IACR Cryptology ePrint Archive (2012) X. Zhao, S. Guo, F. Zhang, T. Wang, Z. Shi, K. Ji, Algebraic differential fault attacks on LED using a single fault injection, in IACR Cryptology ePrint Archive (2012)
22.
Zurück zum Zitat X. Zhao, S. Guo, F. Zhang, Z. Shi, C. Ma, T. Wang, Improving and evaluating differential fault analysis on LED with algebraic techniques, in Proceedings of the 10th IEEE Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), Santa Barbara, August 2013 (IEEE, Los Alamitos, 2013), pp. 41–51 X. Zhao, S. Guo, F. Zhang, Z. Shi, C. Ma, T. Wang, Improving and evaluating differential fault analysis on LED with algebraic techniques, in Proceedings of the 10th IEEE Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), Santa Barbara, August 2013 (IEEE, Los Alamitos, 2013), pp. 41–51
23.
Zurück zum Zitat X. Zhao, S. Guo, F. Zhang, T. Wang, Z. Shi, D. Gu, C. Ma, Algebraic fault analysis on GOST for key recovery and reverse engineering, in FDTC (2014), pp. 29–39 X. Zhao, S. Guo, F. Zhang, T. Wang, Z. Shi, D. Gu, C. Ma, Algebraic fault analysis on GOST for key recovery and reverse engineering, in FDTC (2014), pp. 29–39
Metadaten
Titel
An Automated Framework for Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers
verfasst von
Fan Zhang
Bolin Yang
Shize Guo
Xinjie Zhao
Tao Wang
Francois-Xavier Standaert
Dawu Gu
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-11333-9_5

Neuer Inhalt