Differential fault analysis attack-tolerant hardware implementation of AES

被引:2
|
作者
Ghosal, Anit Kumar [1 ]
Sardar, Amit [1 ]
Chowdhury, Dipanwita Roy [1 ]
机构
[1] IIT Kharagpur, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
来源
JOURNAL OF SUPERCOMPUTING | 2024年 / 80卷 / 04期
关键词
AES Rijndael; DFA attack; MixColumn-Plus; Hardware implementation; HIGHER-ORDER MASKING; RSA; COUNTERMEASURE; POWER;
D O I
10.1007/s11227-023-05632-2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic circuits contain various confidential information and are susceptible to fraudulent manipulations, commonly called attacks, performed by ill-intentioned person. The primary goal of the attacker is to retrieve the sensitive information when the device is executing some task. One of the most efficient attack is Differential Fault Analysis attack that exploits the physical or implementation weakness of the device by injecting faults, for example with a laser beam, overheating, etc. AES is vulnerable against Differential Fault Analysis attack. The adversary can form a system of linear equations with a pair of ciphertexts to break AES cryptosystem. In the literature, it is shown that AES key can be recovered using this kind of fault attack with an exhaustive search of 2(32), which is further improved to 2(8). Using a 32 cores processor with 2.1 GHz clock speed each, the AES-128 key can be retrieved within 17.5 s. Ghosal et al. as reported by Ghosal (in: Yuan, Bai, Alcaraz, Majumdar (eds) International Conference on Network and System Security, Springer, Cham, 2022) propose an extra diffusion layer to AES cryptosystem, MixColumn-Plus, to strengthen the security of AES against such attack. With the addition of an extra diffusion layer, an attacker has to search exhaustively 2(84) keys. In this work, we propose another matrix for MixColumn-Plus and further, we implement MixColumnPlus layer with both matrices in hardware platform and compare the delay, LUT, gate count, frequency and execution time with original AES. The complexity of the byte fault attack is improved to 2(116) with the proposed matrix. The proposed hardware implementation of AES with MixColumn-Plus can be called as DFA attack-tolerant module.
引用
收藏
页码:4648 / 4681
页数:34
相关论文
共 50 条
  • [41] Power-analysis attack on an ASIC AES implementation
    Örs, SB
    Gürkaynak, F
    Oswald, E
    Preneel, B
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 546 - 552
  • [42] Hardware implementation of a fault-tolerant Hopfield Neural Network on FPGAs
    Antonio Clemente, Juan
    Mansour, Wassim
    Ayoubi, Rafic
    Serrano, Felipe
    Mecha, Hortensia
    Ziade, Haissam
    El Falou, Wassim
    Velazco, Raoul
    NEUROCOMPUTING, 2016, 171 : 1606 - 1609
  • [43] Differential Fault Analysis on AES by Round Reduction
    Bae, KiSeok
    Moon, SangJae
    Choi, DooHo
    Choi, YongJe
    Choi, Doo-sik
    Ha, JaeCheol
    2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 607 - 612
  • [44] A fault-tolerant message passing algorithm and its hardware implementation
    Sirakoulis, GC
    Raptis, V
    Karafyllidis, I
    Tsalides, P
    Thanailakis, A
    ADVANCES IN ENGINEERING SOFTWARE, 2005, 36 (03) : 159 - 171
  • [45] Differential fault analysis by reducing AES round
    Bae, KiSeok
    Moon, SangJae
    Choi, DooHo
    Choi, YongJe
    Choi, DooSik
    Ha, JaeCheol
    Advances in Information Sciences and Service Sciences, 2012, 4 (11): : 103 - 113
  • [46] Attack-Tolerant Switched Fault Detection Filter for Networked Stochastic Systems Under Resilient Event-Triggered Scheme
    Chen, Xiaoli
    Hu, Songlin
    Yue, Dong
    Xie, Xiangpeng
    Dou, Chunxia
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 52 (03): : 1984 - 1996
  • [47] Attack-Tolerant Localization via Iterative Verification of Locations in Sensor Networks
    Park, Taejoon
    Shin, Kang G.
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2008, 8 (01)
  • [48] Template Attack on Masking AES Based on Fault Sensitivity Analysis
    Wang, Qian
    Wang, An
    Wu, Liji
    Qu, Gang
    Zhang, Guoshuang
    2015 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2015, : 96 - 99
  • [49] A differential fault attack technique against SPN structures, with application to the AES and KHAZAD
    Piret, G
    Quisquater, JJ
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, 2003, 2779 : 77 - 88
  • [50] Differential Fault Attack on AES Using Maximum Four Bytes Faulty Ciphertexts
    Huh, Jae-Won
    Han, Dong-Guk
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2022, 2023, 13849 : 235 - 245