FaultMeter: Quantitative Fault Attack Assessment of Block Cipher Software

被引:0
|
作者
Keerthi K. [1 ]
Rebeiro C. [1 ]
机构
[1] Indian Institute of Technology Madras, India
关键词
Automatic Fault Attack Evaluation; Fault Attack; Quantification Coun-termeasures;
D O I
10.46586/tches.v2023.i2.212-240
中图分类号
学科分类号
摘要
Fault attacks are a potent class of physical attacks that exploit a fault injected during device operation to steal secret keys from a cryptographic device. The success of a fault attack depends intricately on (a) the cryptographic properties of the cipher, (b) the program structure, and (c) the underlying hardware architecture. While there are several tools that automate the process of fault attack evaluation, none of them consider all three influencing aspects. This paper proposes a framework called FaultMeter that builds on the state-of-art by not just identifying fault vulnerable locations in a block cipher software, but also providing a quantification for each vulnerable location. The quantification provides a probability that an injected fault can be successfully exploited. It takes into consid-eration the cryptographic properties of the cipher, structure of the implementation, and the underlying Instruction Set Architecture’s (ISA) susceptibility to faults. We demonstrate an application of FaultMeter to automatically insert optimal amounts of countermeasures in a program to meet the user’s security requirements while minimizing overheads. We demonstrate the versatility of the FaultMeter framework by evaluating five cipher implementations on multiple hardware platforms, namely, ARM (32 and 64 bit), RISC-V (32 and 64 bit), TI MSP-430 (16-bit) and Intel x86 (64-bit). © 2023, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:212 / 240
页数:28
相关论文
共 50 条
  • [31] Integral Attack on the Full FUTURE Block Cipher
    Xu, Zeyu
    Cui, Jiamin
    Hu, Kai
    Wang, Meiqin
    TSINGHUA SCIENCE AND TECHNOLOGY, 2025, 30 (01): : 161 - 170
  • [32] Differential Fault Analysis and Meet-in-the-Middle Attack on the Block Cipher KATAN32
    张文英
    刘枫
    刘宣
    孟帅
    Journal of Shanghai Jiaotong University(Science), 2013, 18 (02) : 147 - 152
  • [33] New Differential Fault Attack on Lightweight Cipher LBlock
    Wei, Yuechuan
    Rong, Yisheng
    Wang, Xu An
    2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 285 - 288
  • [34] High-Speed Fault Attack Resistant Implementation of PIPO Block Cipher on ARM Cortex-A
    Song, Jingyo
    Kim, Youngbeom
    Seo, Seog Chung
    IEEE ACCESS, 2021, 9 : 162893 - 162908
  • [35] An Improved Differential Fault Attack on the Stream Cipher Espresso
    Das, Debendranath
    Ghatak, Anirban
    Gupta, Indivar
    Karati, Sabyasachi
    Mandal, Arindam
    PROGRESS IN CRYPTOLOGY-INDOCRYPT 2024, PT II, 2025, 15496 : 73 - 89
  • [36] The differential fault analysis on block cipher FeW
    Haiyan Xiao
    Lifang Wang
    Jinyong Chang
    Cybersecurity, 5
  • [37] Similarity Property and Slide Attack of Block Cipher FESH
    Zheng, Yafei
    Wu, Wenling
    IET INFORMATION SECURITY, 2023, 2023 (01)
  • [38] Differential fault analysis on block cipher SEED
    Jeong, Kitae
    Lee, Yuseop
    Sung, Jaechul
    Hong, Seokhie
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 26 - 34
  • [39] The differential fault analysis on block cipher FeW
    Xiao, Haiyan
    Wang, Lifang
    Chang, Jinyong
    CYBERSECURITY, 2022, 5 (01)
  • [40] Preventing Fault Attack on Stream Cipher using Randomization
    Ghosh, Shamit
    Chowdhury, Dipanwita Roy
    2015 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2015, : 88 - 91