A Provably Secure Scheme to Prevent Master Key Recovery by Fault Attack on AES Hardware

被引:0
|
作者
Swaroopa, Sneha [1 ]
Manivannan, Sivappriya [1 ]
Chakraborty, Rajat Subhra [1 ]
Chakrabarti, Indrajit [1 ]
机构
[1] IIT Kharagpur, Dept Comp Sci & Engn, Kharagpur 721302, India
关键词
Encryption; Generators; Clocks; Circuit faults; Ciphers; Hardware; Transformers; Standards; Shift registers; Polynomials; Advanced encryption standard (AES); fault attack; key transformation; security proof; self-shrinking generator (SSG);
D O I
10.1109/LES.2024.3472673
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We explore a relatively lightweight scheme to prevent key recovery by fault attacks on the advanced encryption standard (AES) cipher. We employ a transformed key (derived from the original key through a nonlinear and possibly one-way mapping) for AES encryption hardware. The mapping combines processing using a pseudorandom bitstream generator (the keystream generator of the Grain-128a stream cipher), followed by a self-shrinking generator (SSG). We provide formal proof of security of the scheme, based on the assumed difficulty of inverting the output of the proposed key transformer. The design of the key transformer ensures that it is itself resistant to fault-attack. Our scheme requires a 96-bit secret initial value (IV), a one-time initial latency (approximately 256 clock cycles for a 128-bit key) of generating the transformed key, and a key transformation layer. However, the core AES hardware is left unchanged. We present hardware platform-based experimental results for an FPGA implementation, which incurs less hardware overhead than previously proposed fault attack prevention/detection schemes.
引用
收藏
页码:521 / 524
页数:4
相关论文
共 50 条
  • [31] A provably secure biometrics and ECC-based authentication and key agreement scheme for WSNs
    Kumari, Saru
    Renuka, Km.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (03)
  • [32] A provably secure anonymous mutual authentication scheme with key agreement for SIP using ECC
    Xu, Dongqing
    Zhang, Shu
    Chen, Jianhua
    Ma, Mimi
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (05) : 837 - 847
  • [33] A provably secure anonymous mutual authentication scheme with key agreement for SIP using ECC
    Dongqing Xu
    Shu Zhang
    Jianhua Chen
    Mimi Ma
    Peer-to-Peer Networking and Applications, 2018, 11 : 837 - 847
  • [34] An efficient and provably secure time-limited key management scheme for outsourced data
    Kumar, Naveen
    Tiwari, Shailesh
    Zheng, Zhigao
    Mishra, Krishn K.
    Sangaiah, Arun Kumar
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2018, 30 (15):
  • [35] An efficient hardware-based fault diagnosis scheme for AES: Performances and cost
    Bertoni, G
    Breveglieri, L
    Koren, I
    Maistri, P
    19TH IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI SYSTEMS, PROCEEDINGS, 2004, : 130 - 138
  • [36] A Forward Secure Identity Based Encryption Scheme with Master Key Update
    Yang, Peng
    Matsuura, Kanta
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 336 - 341
  • [37] An Authenticated Accumulator Scheme for Secure Master Key Access in Microservice Architectures
    Salin, Hannes
    Fokin, Dennis
    International Conference on Internet of Things, Big Data and Security, IoTBDS - Proceedings, 2022, 2022-April : 119 - 126
  • [38] A Provably Secure ID-Based Mutual Authentication and Key Agreement Scheme for Mobile Multi-Server Environment Without ESL Attack
    Islam, S. K. Hafizul
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 79 (03) : 1975 - 1991
  • [39] A Provably Secure ID-Based Mutual Authentication and Key Agreement Scheme for Mobile Multi-Server Environment Without ESL Attack
    SK Hafizul Islam
    Wireless Personal Communications, 2014, 79 : 1975 - 1991
  • [40] An Authenticated Accumulator Scheme for Secure Master Key Access in Microservice Architectures
    Salin, Hannes
    Fokin, Dennis
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS), 2022, : 119 - 126