Improved Fault Attack on LBlock: Earlier Injection with No Extra Faults

被引:1
|
作者
Gao Si [1 ,2 ]
Chen Hua [1 ]
Fan Limin [1 ]
Wu Wenling [1 ]
机构
[1] Chinese Acad Sci, Inst Software, Trusted Comp & Informat Assurance Lab, Beijing 100190, Peoples R China
[2] Chinese Acad Sci, Grad Univ, Beijing 100190, Peoples R China
关键词
Implementation analysis; Fault analysis; Random fault model;
D O I
10.1049/cje.2017.04.007
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As one of the most popular lightweight ciphers in recent years, LBlock has attracted great attention. Researchers have explored the security of LBlock against various attacks. We focus on fault attack one of the most important implementation attacks. In the past two years, fault attacks under the random fault model have been successfully applied to LBlock, supposing faults were injected at the end of the 24th to the 31st round. If faults are injected at the end of the 23rd round, previous attacks only work under the semi-random fault model. For the first time, we address this issue and propose a 23rd round fault attack under the random fault model. Compared with the previous works, our attack extends the fault injection to earlier round, with reasonable time cost and no extra faults. Experiments show that it only takes 10 faults to recover the secret key.
引用
收藏
页码:754 / 759
页数:6
相关论文
共 50 条
  • [41] Improved fault detection and estimation for nonlinear stochastic system with abrupt faults
    Ding, Bo
    Fang, Huajing
    2017 29TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2017, : 6480 - 6485
  • [42] IMPROVED ALGORITHM FOR DETECTING ARCING FAULTS USING RANDOM FAULT BEHAVIOR
    BENNER, C
    CARSWELL, P
    RUSSELL, BD
    ELECTRIC POWER SYSTEMS RESEARCH, 1989, 17 (01) : 49 - 56
  • [43] Key-Recovery Fault Injection Attack on the Classic McEliece KEM
    Pircher, Sabine
    Geier, Johannes
    Danner, Julian
    Mueller-Gritschneder, Daniel
    Wachter-Zeh, Antonia
    CODE-BASED CRYPTOGRAPHY, CBCRYPTO 2022, 2023, 13839 : 37 - 61
  • [44] Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure
    Fukushima, Kazuhide
    Xu, Rui
    Kiyomoto, Shinsaku
    Homma, Naofumi
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 1032 - 1037
  • [45] Adversarial Examples Created by Fault Injection Attack on Image Sensor Interface
    Oyama, Tatsuya
    Yoshida, Kota
    Okura, Shunsuke
    Fujino, Takeshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2024, E107A (03) : 344 - 354
  • [46] FTC: A Universal Framework for Fault-Injection Attack Detection and Prevention
    Muttaki, Md Rafid
    Rahman, Md Habibur
    Kulkarni, Akshay
    Tehranipoor, Mark
    Farahmandi, Farimah
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2024, 32 (07) : 1311 - 1324
  • [47] Fault Injection Attack Emulation Framework for Early Evaluation of IC Designs
    Liu, Qiang
    Tang, Honghui
    Zhang, Peiran
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2022, 27 (01)
  • [48] Measurement on Effect of Controlled Wave Phase in EM Fault Injection Attack
    Shinoda, Yuto
    Takenouchi, Mitsuki
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    PROCEEDINGS OF THE 2020 INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC EUROPE), 2020,
  • [49] A Low-Cost Fault Injection Attack Resilient FSM Design
    Wang, Ziming
    Cui, Aijiao
    Qu, Gang
    2020 IEEE 33RD INTERNATIONAL SYSTEM-ON-CHIP CONFERENCE (SOCC), 2020, : 19 - 24
  • [50] LLFI: An Intermediate Code-Level Fault Injection Tool for Hardware Faults
    Lu, Qining
    Farahani, Mostafa
    Wei, Jiesheng
    Thomas, Anna
    Pattabiraman, Karthik
    2015 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY (QRS 2015), 2015, : 11 - 16