首页> 外文期刊>IEEE Transactions on Computers >SCADFA: Combined SCA+DFA Attacks on Block Ciphers with Practical Validations
【24h】

SCADFA: Combined SCA+DFA Attacks on Block Ciphers with Practical Validations

机译:SCADFA:使用实际验证,将SCA + DFA攻击放在块密码中

获取原文
获取原文并翻译 | 示例
           

摘要

We present the first practically realizable side-channel assisted fault attack on any block-ciphers having bit-permutation with optimal diffusion, that can retrieve the round key efficiently using random nibble faults. The attack demonstrates how side-channel leakage can allow the adversary to precisely determine the fault mask resulting from a nibble fault injection instance. We first demonstrate the viability of such attack model via side-channel analysis experiments on top of a laser-based fault injection setup, targeting a PRESENT-80 and GIFT-128 (two popular block-ciphers based on bit-permutation having optimal diffusion) implementation on an ATmega328P microcontroller. Subsequently, we present a differential fault analysis (DFA) exploiting the knowledge of the output fault mask in the target round to recover multiple last round keys nibbles independently and in parallel. We show that the combined attack can recover the last round key of PRESENT-80 and GIFT-128 with 4 random nibble fault injections in the best case. In the average case, the number of random nibble faults required for PRESENT-80 and GIFT-128 are 9-18 and 6-9 respectively.
机译:我们在具有最佳扩散的任何块密钥频带上介绍了第一场实际上可实现的侧通道辅助故障攻击,可以使用随机啃故障有效地检索圆形钥匙。该攻击展示了侧通道泄漏如何允许对手精确地确定由啃咬故障注射实例产生的故障掩模。我们首先通过侧通道分析实验证明这种攻击模型的可行性在基于激光的故障喷射设置之上,瞄准了当前80和礼物-128(基于具有最佳扩散的比特置换的两个流行的块密码)在Atmega328P微控制器上实现。随后,我们提出了一种差异故障分析(DFA)利用目标圆形中的输出故障掩码的知识来恢复多个圆形键独立地恢复,并并行地恢复。我们表明,组合攻击可以在最佳情况下用4个随机啃故障注射恢复现有80和礼品128的最后一键键。在平均案例中,当前80和礼物-128所需的随机啃故障的数量分别为9-18和6-9。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号