A Provably Secure Scheme to Prevent Master Key Recovery by Fault Attack on AES Hardware

被引:0
|
作者
Swaroopa, Sneha [1 ]
Manivannan, Sivappriya [1 ]
Chakraborty, Rajat Subhra [1 ]
Chakrabarti, Indrajit [1 ]
机构
[1] IIT Kharagpur, Dept Comp Sci & Engn, Kharagpur 721302, India
关键词
Encryption; Generators; Clocks; Circuit faults; Ciphers; Hardware; Transformers; Standards; Shift registers; Polynomials; Advanced encryption standard (AES); fault attack; key transformation; security proof; self-shrinking generator (SSG);
D O I
10.1109/LES.2024.3472673
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We explore a relatively lightweight scheme to prevent key recovery by fault attacks on the advanced encryption standard (AES) cipher. We employ a transformed key (derived from the original key through a nonlinear and possibly one-way mapping) for AES encryption hardware. The mapping combines processing using a pseudorandom bitstream generator (the keystream generator of the Grain-128a stream cipher), followed by a self-shrinking generator (SSG). We provide formal proof of security of the scheme, based on the assumed difficulty of inverting the output of the proposed key transformer. The design of the key transformer ensures that it is itself resistant to fault-attack. Our scheme requires a 96-bit secret initial value (IV), a one-time initial latency (approximately 256 clock cycles for a 128-bit key) of generating the transformed key, and a key transformation layer. However, the core AES hardware is left unchanged. We present hardware platform-based experimental results for an FPGA implementation, which incurs less hardware overhead than previously proposed fault attack prevention/detection schemes.
引用
收藏
页码:521 / 524
页数:4
相关论文
共 50 条
  • [21] An efficient and provably secure authenticated key agreement scheme for mobile edge computing
    Rakeei, Mohammadamin
    Moazami, Farokhlagha
    WIRELESS NETWORKS, 2022, 28 (07) : 2983 - 2999
  • [22] An efficient and provably secure authenticated key agreement scheme for mobile edge computing
    Mohammadamin Rakeei
    Farokhlagha Moazami
    Wireless Networks, 2022, 28 : 2983 - 2999
  • [23] A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    Cramer, R
    Shoup, V
    ADVANCES IN CRYPTOLOGY - CRYPTO'98, 1998, 1462 : 13 - 25
  • [24] A Novel Key Exchange Protocol Provably Secure Against Man-in-the-Middle Attack
    Chowdhury, Abhijit
    Nath, Shubhajit
    Howlader, Jaydeep
    NETWORKS AND COMMUNICATIONS (NETCOM2013), 2014, 284 : 275 - 280
  • [25] Enhancing the resistance of a provably secure key agreement protocol to a denial-of-service attack
    Hirose, S
    Matsuura, K
    INFORMATION AND COMMUNICATON SECURITY, PROCEEDINGS, 1999, 1726 : 169 - 182
  • [26] On Clock-Based Fault Analysis Attack for an AES Hardware Using RSL
    Sakiyama, Kazuo
    Ohta, Kazuo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (01) : 172 - 179
  • [27] Secure Proactive Recovery - a Hardware Based Mission Assurance Scheme
    Mehresh, Ruchika
    Upadhyaya, Shambhu
    Kwiat, Kevin
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 171 - 179
  • [28] New Key-Recovery Attack on Reduced-Round AES
    Bardeh, Navid Ghaedi
    Rijmen, Vincent
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2022, 2022 (02) : 43 - 62
  • [29] A key recovery attack on Fully Homomorphic Encryption scheme
    Guang, Yan
    Zhu, Yue-Fei
    Gu, Chun-Xiang
    Zheng, Yong-Hui
    Tang, Quan-You
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2013, 35 (12): : 2999 - 3004
  • [30] Provably secure authenticated key agreement scheme for distributed mobile cloud computing services
    Odelu, Vanga
    Das, Ashok Kumar
    Kumari, Saru
    Huang, Xinyi
    Wazid, Mohammad
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 68 : 74 - 88