FaultMeter: Quantitative Fault Attack Assessment of Block Cipher Software

被引:0
|
作者
Keerthi K. [1 ]
Rebeiro C. [1 ]
机构
[1] Indian Institute of Technology Madras, India
关键词
Automatic Fault Attack Evaluation; Fault Attack; Quantification Coun-termeasures;
D O I
10.46586/tches.v2023.i2.212-240
中图分类号
学科分类号
摘要
Fault attacks are a potent class of physical attacks that exploit a fault injected during device operation to steal secret keys from a cryptographic device. The success of a fault attack depends intricately on (a) the cryptographic properties of the cipher, (b) the program structure, and (c) the underlying hardware architecture. While there are several tools that automate the process of fault attack evaluation, none of them consider all three influencing aspects. This paper proposes a framework called FaultMeter that builds on the state-of-art by not just identifying fault vulnerable locations in a block cipher software, but also providing a quantification for each vulnerable location. The quantification provides a probability that an injected fault can be successfully exploited. It takes into consid-eration the cryptographic properties of the cipher, structure of the implementation, and the underlying Instruction Set Architecture’s (ISA) susceptibility to faults. We demonstrate an application of FaultMeter to automatically insert optimal amounts of countermeasures in a program to meet the user’s security requirements while minimizing overheads. We demonstrate the versatility of the FaultMeter framework by evaluating five cipher implementations on multiple hardware platforms, namely, ARM (32 and 64 bit), RISC-V (32 and 64 bit), TI MSP-430 (16-bit) and Intel x86 (64-bit). © 2023, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:212 / 240
页数:28
相关论文
共 50 条
  • [41] Meet-in-the-middle attack on TWINE block cipher
    Wang, Yan-Feng
    Wu, Wen-Ling
    Ruan Jian Xue Bao/Journal of Software, 2015, 26 (10): : 2684 - 2695
  • [42] Fault Attack on FPGA implementations of Trivium Stream Cipher
    Potestad-Ordonez, F. E.
    Jimenez-Fernandez, C. J.
    Valencia-Barrero, M.
    2016 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2016, : 562 - 565
  • [43] Software Implementation of New Symmetric Block Cipher
    Dudek, Jakub
    Machowski, Lukasz
    Romanski, Lukasz
    Swiety, Marcin
    MULTIMEDIA COMMUNICATIONS, SERVICES, AND SECURITY, 2011, 149 : 216 - 224
  • [44] Power Attack and Protected Implementation on Block Cipher BIG
    Gao, Jixiang
    Gu, Lize
    Sun, Bin
    2020 5TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, COMPUTER TECHNOLOGY AND TRANSPORTATION (ISCTT 2020), 2020, : 386 - 391
  • [45] Electromagnetic Analysis Attack for a Lightweight Block Cipher TWINE
    Yoshikawa, Masava
    Nozaki, Yusukc
    Asahi, Kcnsaku
    2016 IEEE/ACES INTERNATIONAL CONFERENCE ON WIRELESS INFORMATION TECHNOLOGY AND SYSTEMS (ICWITS) AND APPLIED COMPUTATIONAL ELECTROMAGNETICS (ACES), 2016,
  • [46] Differential Collision Attack on Reduced FOX Block Cipher
    Chen Jie
    Hu Yupu
    Zhang Yueyu
    Dong Xiaoli
    CHINA COMMUNICATIONS, 2012, 9 (07) : 71 - 76
  • [47] A compress slide attack on the full GOST block cipher
    Lu, Linzhen
    Chen, Shaozhen
    INFORMATION PROCESSING LETTERS, 2013, 113 (17) : 634 - 639
  • [48] New Rectangle Attack Against SKINNY Block Cipher
    Zhang, Jiyan
    Cui, Ting
    Jin, Chenhui
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT III, 2021, 12939 : 399 - 409
  • [49] Differential attack on nine rounds of the SEED block cipher
    Lu, Jiqiang
    Yap, Wun-She
    Henricksen, Matt
    Heng, Swee-Huay
    INFORMATION PROCESSING LETTERS, 2014, 114 (03) : 116 - 123
  • [50] A Statistical Saturation Attack against the Block Cipher PRESENT
    Collard, B.
    Standaert, F-X.
    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 195 - 210