首页> 外文期刊>IEEE Transactions on Computers >SCADFA: Combined SCA+DFA Attacks on Block Ciphers with Practical Validations
【24h】

SCADFA: Combined SCA+DFA Attacks on Block Ciphers with Practical Validations

机译:SCADFA:对SCA密码的SCA + DFA攻击结合了实际验证

获取原文
获取原文并翻译 | 示例
           

摘要

We present the first practically realizable side-channel assisted fault attack on any block-ciphers having bit-permutation with optimal diffusion, that can retrieve the round key efficiently using random nibble faults. The attack demonstrates how side-channel leakage can allow the adversary to precisely determine the fault mask resulting from a nibble fault injection instance. We first demonstrate the viability of such attack model via side-channel analysis experiments on top of a laser-based fault injection setup, targeting a PRESENT-80 and GIFT-128 (two popular block-ciphers based on bit-permutation having optimal diffusion) implementation on an ATmega328P microcontroller. Subsequently, we present a differential fault analysis (DFA) exploiting the knowledge of the output fault mask in the target round to recover multiple last round keys nibbles independently and in parallel. We show that the combined attack can recover the last round key of PRESENT-80 and GIFT-128 with 4 random nibble fault injections in the best case. In the average case, the number of random nibble faults required for PRESENT-80 and GIFT-128 are 9-18 and 6-9 respectively.
机译:我们提出了对任何具有最佳扩散的位置换的分组密码的第一个可实际实现的边信道辅助故障攻击,它可以使用随机半字节错误有效地检索出密钥。攻击证明了旁通道泄漏如何使敌方精确确定由轻咬故障注入实例导致的故障屏蔽。我们首先通过针对基于PRESENT-80和GIFT-128(基于位置换具有最佳扩散的两种流行的分组密码)的基于激光的故障注入设置的旁通道分析实验,证明了这种攻击模型的可行性。在ATmega328P微控制器上实现。随后,我们提出了一种差分故障分析(DFA),利用目标回合中输出故障掩码的知识来独立且并行地恢复多个最后回合密钥半字节。我们显示,在最佳情况下,组合攻击可以通过4次随机半字节故障注入来恢复PRESENT-80和GIFT-128的最后一轮密钥。在一般情况下,PRESENT-80和GIFT-128所需的随机半字节故障数分别为9-18和6-9。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号