首页> 外文会议>Workshop on Fault Diagnosis and Tolerance in Cryptography >A Practical Fault Attack on ARX-Like Ciphers with a Case Study on ChaCha20
【24h】

A Practical Fault Attack on ARX-Like Ciphers with a Case Study on ChaCha20

机译:关于Chacha20的案例研究的ARX样CIPERS的实际故障攻击

获取原文
获取外文期刊封面目录资料

摘要

This paper presents the first practical fault attack on the ChaCha family of addition-rotation-XOR (ARX)-based stream ciphers. ChaCha has recently been deployed for speeding up and strengthening HTTPS connections for Google Chrome on Android devices. In this paper, we propose differential fault analysis attacks on ChaCha without resorting to nonce misuse. We use the instruction skip and instruction replacement fault models, which are popularly mounted on microcontroller-based cryptographic implementations. We corroborate the attack propositions via practical fault injection experiments using a laser-based setup targeting an Atmel AVR 8-bit microcontroller-based implementation of ChaCha. Each of the proposed attacks can be repeated with 100% accuracy in our fault injection setup, and can recover the entire 256 bit secret key using 5-8 fault injections on an average.
机译:本文提出了ChaCha系列附加旋转 - XOR(ARX)基流密码的第一个实际故障攻击。最近已经部署了ChaCha以加速和加强在Android设备上加快Google Chrome的HTTPS连接。在本文中,我们向Chacha提出了差异故障分析攻击,而不借用随机滥用。我们使用指令跳过和指令替换故障模型,它普遍安装在基于微控制器的加密实现上。我们通过使用基于激光的设置的实际故障注射实验来证明攻击命题,其定位ATMEL AVR 8位微控制器的ChaCha实现。在我们的故障喷射设置中可以以100 %的准确度重复每个提出的攻击,并且可以平均使用5-8个故障注入的整个256位密钥。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号