A Practical Fault Attack on ARX-Like Ciphers with a Case Study on ChaCha20

S. V. Dilip Kumar, Sikhar Patranabis, J. Breier, Debdeep Mukhopadhyay, S. Bhasin, A. Chattopadhyay, Anubhab Baksi
{"title":"A Practical Fault Attack on ARX-Like Ciphers with a Case Study on ChaCha20","authors":"S. V. Dilip Kumar, Sikhar Patranabis, J. Breier, Debdeep Mukhopadhyay, S. Bhasin, A. Chattopadhyay, Anubhab Baksi","doi":"10.1109/FDTC.2017.14","DOIUrl":null,"url":null,"abstract":"This paper presents the first practical fault attack on the ChaCha family of addition-rotation-XOR (ARX)-based stream ciphers. ChaCha has recently been deployed for speeding up and strengthening HTTPS connections for Google Chrome on Android devices. In this paper, we propose differential fault analysis attacks on ChaCha without resorting to nonce misuse. We use the instruction skip and instruction replacement fault models, which are popularly mounted on microcontroller-based cryptographic implementations. We corroborate the attack propositions via practical fault injection experiments using a laser-based setup targeting an Atmel AVR 8-bit microcontroller-based implementation of ChaCha. Each of the proposed attacks can be repeated with 100% accuracy in our fault injection setup, and can recover the entire 256 bit secret key using 5-8 fault injections on an average.","PeriodicalId":227188,"journal":{"name":"2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)","volume":"195 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"29","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FDTC.2017.14","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 29

Abstract

This paper presents the first practical fault attack on the ChaCha family of addition-rotation-XOR (ARX)-based stream ciphers. ChaCha has recently been deployed for speeding up and strengthening HTTPS connections for Google Chrome on Android devices. In this paper, we propose differential fault analysis attacks on ChaCha without resorting to nonce misuse. We use the instruction skip and instruction replacement fault models, which are popularly mounted on microcontroller-based cryptographic implementations. We corroborate the attack propositions via practical fault injection experiments using a laser-based setup targeting an Atmel AVR 8-bit microcontroller-based implementation of ChaCha. Each of the proposed attacks can be repeated with 100% accuracy in our fault injection setup, and can recover the entire 256 bit secret key using 5-8 fault injections on an average.
类arx密码的实际故障攻击——以ChaCha20为例
本文首次对基于加-转-异或(ARX)流密码的ChaCha族进行了实际故障攻击。ChaCha最近被部署用于加速和加强Android设备上的Google Chrome浏览器的HTTPS连接。在本文中,我们提出了一种不依赖于非即时误用的差分故障分析攻击。我们使用指令跳过和指令替换故障模型,这两种模型普遍安装在基于微控制器的加密实现中。我们通过实际的故障注入实验证实了攻击命题,使用基于激光的设置,针对基于Atmel AVR 8位微控制器的ChaCha实现。在我们的错误注入设置中,每个建议的攻击都可以以100%的准确率重复,并且平均使用5-8次错误注入可以恢复整个256位密钥。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信