A Provably Secure Scheme to Prevent Master Key Recovery by Fault Attack on AES Hardware

被引:0
|
作者
Swaroopa, Sneha [1 ]
Manivannan, Sivappriya [1 ]
Chakraborty, Rajat Subhra [1 ]
Chakrabarti, Indrajit [1 ]
机构
[1] IIT Kharagpur, Dept Comp Sci & Engn, Kharagpur 721302, India
关键词
Encryption; Generators; Clocks; Circuit faults; Ciphers; Hardware; Transformers; Standards; Shift registers; Polynomials; Advanced encryption standard (AES); fault attack; key transformation; security proof; self-shrinking generator (SSG);
D O I
10.1109/LES.2024.3472673
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We explore a relatively lightweight scheme to prevent key recovery by fault attacks on the advanced encryption standard (AES) cipher. We employ a transformed key (derived from the original key through a nonlinear and possibly one-way mapping) for AES encryption hardware. The mapping combines processing using a pseudorandom bitstream generator (the keystream generator of the Grain-128a stream cipher), followed by a self-shrinking generator (SSG). We provide formal proof of security of the scheme, based on the assumed difficulty of inverting the output of the proposed key transformer. The design of the key transformer ensures that it is itself resistant to fault-attack. Our scheme requires a 96-bit secret initial value (IV), a one-time initial latency (approximately 256 clock cycles for a 128-bit key) of generating the transformed key, and a key transformation layer. However, the core AES hardware is left unchanged. We present hardware platform-based experimental results for an FPGA implementation, which incurs less hardware overhead than previously proposed fault attack prevention/detection schemes.
引用
收藏
页码:521 / 524
页数:4
相关论文
共 50 条
  • [1] Efficient identification scheme provably secure against reset attack
    Zhu, HF
    Liu, JW
    Jiang, RZ
    Feng, DG
    CHINESE JOURNAL OF ELECTRONICS, 2004, 13 (02): : 312 - 315
  • [2] Provably Secure Authenticated Key Agreement Scheme for Smart Grid
    Odelu, Vanga
    Das, Ashok Kumar
    Wazid, Mohammad
    Conti, Mauro
    IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (03) : 1900 - 1910
  • [3] A RELIABLE FAULT DETECTION SCHEME FOR THE AES HARDWARE IMPLEMENTATION
    Bedoui, Mouna
    Mestiri, Hassen
    Bouallegue, Belgacem
    Machhout, Mohsen
    2016 INTERNATIONAL SYMPOSIUM ON SIGNAL, IMAGE, VIDEO AND COMMUNICATIONS (ISIVC), 2016, : 47 - 52
  • [4] Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack
    Xu, Peng
    Jin, Hai
    Wu, Qianhong
    Wang, Wei
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (11) : 2266 - 2277
  • [5] Provably Secure Mutual Authentication and Key Agreement Scheme with User Anonymity
    Hwang, Tzonelih
    Gope, Prosanta
    2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2013,
  • [6] Provably Secure and Lightweight Authentication Key Agreement Scheme for Smart Meters
    Chai, Sheng
    Yin, Haotian
    Xing, Bin
    Li, Zhukun
    Guo, Yunyi
    Zhang, Di
    Zhang, Xin
    He, Da
    Zhang, Jie
    Yu, Xiaoling
    Wang, Wei
    Huang, Xin
    IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (05) : 3816 - 3827
  • [7] An efficient and provably secure key agreement scheme for satellite communication systems
    Zhang, Yuanyuan
    Zhai, Zhibo
    PLOS ONE, 2021, 16 (04):
  • [8] A Provably Secure Public Key Encryption Scheme Based on Isogeny Star
    Han, Weiwei
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2014, 11 (06) : 623 - 627
  • [9] Authenticated key exchange provably secure against the man-in-the-middle attack
    Johnston, AM
    Gemmell, PS
    JOURNAL OF CRYPTOLOGY, 2002, 15 (02) : 139 - 148
  • [10] Authenticated Key Exchange Provably Secure Against the Man-in-the-Middle Attack
    Anna M. Johnston
    Peter S. Gemmell
    Journal of Cryptology, 2002, 15 : 139 - 148