Differential fault analysis attack-tolerant hardware implementation of AES

被引:2
|
作者
Ghosal, Anit Kumar [1 ]
Sardar, Amit [1 ]
Chowdhury, Dipanwita Roy [1 ]
机构
[1] IIT Kharagpur, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
来源
JOURNAL OF SUPERCOMPUTING | 2024年 / 80卷 / 04期
关键词
AES Rijndael; DFA attack; MixColumn-Plus; Hardware implementation; HIGHER-ORDER MASKING; RSA; COUNTERMEASURE; POWER;
D O I
10.1007/s11227-023-05632-2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic circuits contain various confidential information and are susceptible to fraudulent manipulations, commonly called attacks, performed by ill-intentioned person. The primary goal of the attacker is to retrieve the sensitive information when the device is executing some task. One of the most efficient attack is Differential Fault Analysis attack that exploits the physical or implementation weakness of the device by injecting faults, for example with a laser beam, overheating, etc. AES is vulnerable against Differential Fault Analysis attack. The adversary can form a system of linear equations with a pair of ciphertexts to break AES cryptosystem. In the literature, it is shown that AES key can be recovered using this kind of fault attack with an exhaustive search of 2(32), which is further improved to 2(8). Using a 32 cores processor with 2.1 GHz clock speed each, the AES-128 key can be retrieved within 17.5 s. Ghosal et al. as reported by Ghosal (in: Yuan, Bai, Alcaraz, Majumdar (eds) International Conference on Network and System Security, Springer, Cham, 2022) propose an extra diffusion layer to AES cryptosystem, MixColumn-Plus, to strengthen the security of AES against such attack. With the addition of an extra diffusion layer, an attacker has to search exhaustively 2(84) keys. In this work, we propose another matrix for MixColumn-Plus and further, we implement MixColumnPlus layer with both matrices in hardware platform and compare the delay, LUT, gate count, frequency and execution time with original AES. The complexity of the byte fault attack is improved to 2(116) with the proposed matrix. The proposed hardware implementation of AES with MixColumn-Plus can be called as DFA attack-tolerant module.
引用
收藏
页码:4648 / 4681
页数:34
相关论文
共 50 条
  • [31] FedDefender: Client-Side Attack-Tolerant Federated Learning
    Park, Sungwon
    Han, Sungwon
    Wu, Fangzhao
    Kim, Sundong
    Zhu, Bin
    Xie, Xing
    Cha, Meeyoung
    PROCEEDINGS OF THE 29TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, KDD 2023, 2023, : 1850 - 1861
  • [32] A Practical Fault Induction Attack against an FPGA Implementation of AES Cryptosystem
    Momeni, Hamed
    Masoumi, Massoud
    Dehghan, Ali
    2013 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2013, : 134 - +
  • [33] Correlation fault attack on AES
    Wang X.
    Hu W.
    Tan J.
    Zhu J.
    Tang S.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (04): : 192 - 199and208
  • [34] A New Differential Fault Attack on SPN Structure, with Application to AES Cipher
    Li, Wei
    Xia, Xiaoling
    Gu, Dawu
    Liu, Zhiqiang
    Li, Juanru
    Liu, Ya
    JOURNAL OF COMPUTERS, 2011, 6 (02) : 216 - 223
  • [35] DEFINITION AND ANALYSIS OF HARDWARE-FAULT-TOLERANT AND SOFTWARE-FAULT-TOLERANT ARCHITECTURES
    LAPRIE, JC
    ARLAT, J
    BEOUNES, C
    KANOUN, K
    COMPUTER, 1990, 23 (07) : 39 - 51
  • [36] LT-OLSR: Attack-Tolerant OLSR Against Link Spoofing
    Jeon, Yuseok
    Kim, Tae-Hyung
    Kim, Yuna
    Kim, Jong
    37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2012), 2012, : 216 - 219
  • [37] Implementation and Comparative Analysis of the Fault Attacks on AES
    Raza, Saleem
    Saqib, Malik Najmus
    Shakeel, Azfar
    Khan, Majid Iqbal
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (06) : 625 - 634
  • [38] A Provably Secure Scheme to Prevent Master Key Recovery by Fault Attack on AES Hardware
    Swaroopa, Sneha
    Manivannan, Sivappriya
    Chakraborty, Rajat Subhra
    Chakrabarti, Indrajit
    IEEE EMBEDDED SYSTEMS LETTERS, 2024, 16 (04) : 521 - 524
  • [39] Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack
    Yaseen, Amer Atta
    Bayart, Mireille
    13TH EUROPEAN WORKSHOP ON ADVANCED CONTROL AND DIAGNOSIS (ACD 2016), 2017, 783
  • [40] AES embedded hardware implementation
    Mourad, Ould-Cheikh
    Lotfy, Si-Mohamed
    Noureddine, Mehallegue
    Ahmed, Bouridane
    Camel, Tanougast
    NASA/ESA CONFERENCE ON ADAPTIVE HARDWARE AND SYSTEMS, PROCEEDINGS, 2007, : 103 - +