Differential fault analysis attack-tolerant hardware implementation of AES

被引:2
|
作者
Ghosal, Anit Kumar [1 ]
Sardar, Amit [1 ]
Chowdhury, Dipanwita Roy [1 ]
机构
[1] IIT Kharagpur, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
来源
JOURNAL OF SUPERCOMPUTING | 2024年 / 80卷 / 04期
关键词
AES Rijndael; DFA attack; MixColumn-Plus; Hardware implementation; HIGHER-ORDER MASKING; RSA; COUNTERMEASURE; POWER;
D O I
10.1007/s11227-023-05632-2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic circuits contain various confidential information and are susceptible to fraudulent manipulations, commonly called attacks, performed by ill-intentioned person. The primary goal of the attacker is to retrieve the sensitive information when the device is executing some task. One of the most efficient attack is Differential Fault Analysis attack that exploits the physical or implementation weakness of the device by injecting faults, for example with a laser beam, overheating, etc. AES is vulnerable against Differential Fault Analysis attack. The adversary can form a system of linear equations with a pair of ciphertexts to break AES cryptosystem. In the literature, it is shown that AES key can be recovered using this kind of fault attack with an exhaustive search of 2(32), which is further improved to 2(8). Using a 32 cores processor with 2.1 GHz clock speed each, the AES-128 key can be retrieved within 17.5 s. Ghosal et al. as reported by Ghosal (in: Yuan, Bai, Alcaraz, Majumdar (eds) International Conference on Network and System Security, Springer, Cham, 2022) propose an extra diffusion layer to AES cryptosystem, MixColumn-Plus, to strengthen the security of AES against such attack. With the addition of an extra diffusion layer, an attacker has to search exhaustively 2(84) keys. In this work, we propose another matrix for MixColumn-Plus and further, we implement MixColumnPlus layer with both matrices in hardware platform and compare the delay, LUT, gate count, frequency and execution time with original AES. The complexity of the byte fault attack is improved to 2(116) with the proposed matrix. The proposed hardware implementation of AES with MixColumn-Plus can be called as DFA attack-tolerant module.
引用
收藏
页码:4648 / 4681
页数:34
相关论文
共 50 条
  • [21] Attack-tolerant time-synchronization in wireless sensor networks
    Hu, Xin
    Park, Taejoon
    Shin, Kang G.
    27TH IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), VOLS 1-5, 2008, : 448 - 456
  • [22] Power Analysis Attack of an AES GPU Implementation
    Chao Luo
    Yunsi Fei
    Liwei Zhang
    A. Adam Ding
    Pei Luo
    Saoni Mukherjee
    David Kaeli
    Journal of Hardware and Systems Security, 2018, 2 (1) : 69 - 82
  • [23] An Extension of Differential Fault Analysis on AES
    Li, Wei
    Wang, Yong
    Gu, Dawu
    Li, Juanru
    Liu, Zhiqiang
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 443 - +
  • [24] Event-Triggered Attack-Tolerant Control for Quadrotor UAV
    Li, Haiming
    Zheng, Shiqi
    Zhao, Chenghao
    Jian, Haitao
    Wang, Shihao
    2021 PROCEEDINGS OF THE 40TH CHINESE CONTROL CONFERENCE (CCC), 2021, : 2292 - 2297
  • [25] On the Event-based Attack-tolerant Control: A Polytopic Representation
    Bezzaoucha Rebai, Souad
    Voos, Holger
    PROCEEDINGS OF 2019 3RD INTERNATIONAL CONFERENCE ON AUTOMATION, CONTROL AND ROBOTS (ICACR 2019), 2018, : 37 - 43
  • [26] Differential Power Analysis Attack on ARM based AES Implementation without Explicit Synchronization
    Petrvalsky, Martin
    Drutarovsky, Milos
    Varchola, Michal
    2014 24TH INTERNATIONAL CONFERENCE RADIOELEKTRONIKA (RADIOELEKTRONIKA 2014), 2014,
  • [27] ReCoNet: Modeling and implementation of fault tolerant distributed reconfigurable hardware
    Haubelt, C
    Koch, D
    Teich, E
    16TH SYMPOSIUM ON INTEGRATED CIRCUITS AND SYSTEMS DESIGN, SBCCI 2003, PROCEEDINGS, 2003, : 343 - 348
  • [28] Attack-Tolerant Distributed Sensing for Dynamic Spectrum Access Networks
    Min, Alexander W.
    Shin, Kang G.
    Hu, Xin
    2009 17TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2009), 2009, : 294 - 303
  • [29] Multiple Fault Attack on PRESENT with a Hardware Trojan Implementation in FPGA
    Breier, Jakub
    He, Wei
    2015 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT), 2015, : 58 - 64
  • [30] Multiple fault attack on PRESENT with a hardware trojan implementation in FPGA
    Breier, Jakub
    He, Wei
    arXiv, 2017,