FaultMeter: Quantitative Fault Attack Assessment of Block Cipher Software

被引:0
|
作者
Keerthi K. [1 ]
Rebeiro C. [1 ]
机构
[1] Indian Institute of Technology Madras, India
关键词
Automatic Fault Attack Evaluation; Fault Attack; Quantification Coun-termeasures;
D O I
10.46586/tches.v2023.i2.212-240
中图分类号
学科分类号
摘要
Fault attacks are a potent class of physical attacks that exploit a fault injected during device operation to steal secret keys from a cryptographic device. The success of a fault attack depends intricately on (a) the cryptographic properties of the cipher, (b) the program structure, and (c) the underlying hardware architecture. While there are several tools that automate the process of fault attack evaluation, none of them consider all three influencing aspects. This paper proposes a framework called FaultMeter that builds on the state-of-art by not just identifying fault vulnerable locations in a block cipher software, but also providing a quantification for each vulnerable location. The quantification provides a probability that an injected fault can be successfully exploited. It takes into consid-eration the cryptographic properties of the cipher, structure of the implementation, and the underlying Instruction Set Architecture’s (ISA) susceptibility to faults. We demonstrate an application of FaultMeter to automatically insert optimal amounts of countermeasures in a program to meet the user’s security requirements while minimizing overheads. We demonstrate the versatility of the FaultMeter framework by evaluating five cipher implementations on multiple hardware platforms, namely, ARM (32 and 64 bit), RISC-V (32 and 64 bit), TI MSP-430 (16-bit) and Intel x86 (64-bit). © 2023, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:212 / 240
页数:28
相关论文
共 50 条
  • [21] What is the effective key length for a block cipher: an attack on every practical block cipher
    JiaLin Huang
    XueJia Lai
    Science China Information Sciences, 2014, 57 : 1 - 11
  • [22] Fault Analysis of the Piccolo Block Cipher
    Li, Sheng
    Gu, Dawu
    Ma, Zhouqian
    Liu, Zhiqiang
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 482 - 486
  • [23] Differential Fault Attack on the Stream Cipher LIZARD
    MA Zhen
    TIAN Tian
    QI Wenfeng
    Chinese Journal of Electronics, 2021, 30 (03) : 534 - 541
  • [24] Differential Fault Attack on the Stream Cipher LIZARD
    Ma Zhen
    Tian Tian
    Qi Wenfeng
    CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (03) : 534 - 541
  • [25] Impossible Boomerang Attack for Block Cipher Structures
    Choy, Jiali
    Yap, Huihui
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 : 22 - 37
  • [26] A fault attack against the FOX cipher family
    Breveglieri, L.
    Koren, I.
    Maistri, P.
    FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY, PROCEEDINGS, 2006, 4236 : 98 - 105
  • [27] Differential Attack With Constants On μ2 Block Cipher
    Shi, Jiali
    Li, Chao
    Liu, Guoqiang
    COMPUTER JOURNAL, 2024, 67 (01): : 195 - 209
  • [28] Fault attack on Enocoro stream cipher family
    Rostami, Saeed
    Orumiehchiha, Mohammad Ali
    Shakour, Elham
    Alizadeh, Sadegh
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2025, 15 (01)
  • [29] Differential fault analysis and meet-in-the-middle attack on the block cipher KATAN32
    Zhang W.-Y.
    Liu F.
    Liu X.
    Meng S.
    Journal of Shanghai Jiaotong University (Science), 2013, Shanghai Jiaotong University (18): : 147 - 152
  • [30] Truncated Differential Attack on Block Cipher PRINCE
    Setoguchi, Satoshi
    Igarashi, Yasutaka
    Kaneko, Toshinobu
    Arai, Kenichi
    Fukushima, Seiji
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 466 - 474