【24h】

Blind Side-Channel SIFA

机译:blindside-channels IFA

获取原文

摘要

Statistical Ineffective Fault Attacks (SIFA) have been recently proposed as very powerful key-recovery strategies on symmetric cryptographic primitives' implementations. Specifically, they have been shown to bypass many common countermeasures against faults such as redundancy or infection, and to remain applicable even when side-channel countermeasures are deployed. In this work, we investigate combined side-channel and fault attacks and show that a profiled, SIFA-like attack can be applied despite not having any direct ciphertext knowledge. The proposed attack exploits the ciphertext's side-channel and fault characteristics to mount successful key recoveries, even in the presence of masking and duplication countermeasures. We analyze the attack using simulations, discuss its requirements, strengths and limitations, and compare different approaches to distinguish the correct key. Finally, we demonstrate its applicability on an ARM Cortex-M4 device, utilizing a combination of laser-based fault injection and microprobe-based EM side-channel analysis.
机译:最近已经提出了统计无效的故障攻击(SIFA)作为对称加密基元实施的非常强大的关键恢复策略。具体地,已经证明它们绕过诸如冗余或感染等故障的许多共同对策,并且即使部署侧通道对策,即使在侧通道对策时也保持适用。在这项工作中,我们调查了组合的侧通道和故障攻击,并显示了尽管没有任何直接的密文知识,但可以应用SIFA样攻击。建议的攻击利用密文的侧通道和故障特性来安装成功的钥匙恢复,即使在存在掩蔽和复制对策。我们使用模拟分析攻击,讨论其要求,优势和局限性,并比较不同的方法来区分正确的钥匙。最后,我们在ARM Cortex-M4装置上展示了其适用性,利用基于激光的故障注入和基于微探针的EM侧通道分析的组合。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号