首页> 外文会议>Workshop on Fault Diagnosis and Tolerance in Cryptography >A Practical Fault Attack on ARX-Like Ciphers with a Case Study on ChaCha20
【24h】

A Practical Fault Attack on ARX-Like Ciphers with a Case Study on ChaCha20

机译:以ChaCha20为例对ARX类密码进行实际的故障攻击

获取原文

摘要

This paper presents the first practical fault attack on the ChaCha family of addition-rotation-XOR (ARX)-based stream ciphers. ChaCha has recently been deployed for speeding up and strengthening HTTPS connections for Google Chrome on Android devices. In this paper, we propose differential fault analysis attacks on ChaCha without resorting to nonce misuse. We use the instruction skip and instruction replacement fault models, which are popularly mounted on microcontroller-based cryptographic implementations. We corroborate the attack propositions via practical fault injection experiments using a laser-based setup targeting an Atmel AVR 8-bit microcontroller-based implementation of ChaCha. Each of the proposed attacks can be repeated with 100% accuracy in our fault injection setup, and can recover the entire 256 bit secret key using 5-8 fault injections on an average.
机译:本文介绍了对基于ChaCha系列的基于加法旋转XOR(ARX)的流密码的首次实际故障攻击。最近已部署ChaCha,以加快和加强Android设备上Google Chrome浏览器的HTTPS连接。在本文中,我们提出了对ChaCha的差分故障分析攻击,而不会诉诸于随机数滥用。我们使用指令跳过和指令替换故障模型,这些模型普遍安装在基于微控制器的加密实现中。我们通过实际的故障注入实验(使用基于激光的设置,针对基于Chamel的Atmel AVR 8位微控制器的实现)来验证攻击命题。在我们的故障注入设置中,每种提议的攻击都可以100%的精度重复进行,并且平均可以使用5-8次故障注入来恢复整个256位密钥。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号