基础:SUNDAE-GIFT ahead方案的故障模板攻击

Rajat Sadhukhan, Anirban Chakraborty, Debdeep Mukhopadhyay
{"title":"基础:SUNDAE-GIFT ahead方案的故障模板攻击","authors":"Rajat Sadhukhan, Anirban Chakraborty, Debdeep Mukhopadhyay","doi":"10.1109/AsianHOST56390.2022.10022108","DOIUrl":null,"url":null,"abstract":"Fault Attacks (FA) have garnered a lot of attention from industry and academic research due to their practical and wide impact. In the framework of symmetric key cryptography, designing countermeasures against fault attacks is still an open problem with recent developments of advanced fault injection techniques. Recently proposed Fault Template Attack (FTA) has shown that without access to any ciphertext of a crypto execution, an adversary can still recover the secret key just by knowing if the computation is faulty or not. Additionally, usage of Authenticated Encryption with Associated Data (AEAD), a kind of symmetric-key operating mode, has gained momentum and become the standard for secret key communications. In this work, we first show how an adversary can very efficiently launch FTA using a combination of the right fault model and proper selection of an encryption block in AEAD operation, where we could recover full master key using 25 percent less fault requirements when compared to classical fault template attack. Then we propose a generic area redundant countermeasure scheme to thwart FTA in AEADs, where our countermeasure enabled circuit occupied only 16 percent additional area than unprotected circuit. We use SUNDAE-GIFT as the benchmark circuit for all our experiments.","PeriodicalId":207435,"journal":{"name":"2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"FUNDAE: Fault Template Attack on SUNDAE-GIFT AEAD Scheme\",\"authors\":\"Rajat Sadhukhan, Anirban Chakraborty, Debdeep Mukhopadhyay\",\"doi\":\"10.1109/AsianHOST56390.2022.10022108\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Fault Attacks (FA) have garnered a lot of attention from industry and academic research due to their practical and wide impact. In the framework of symmetric key cryptography, designing countermeasures against fault attacks is still an open problem with recent developments of advanced fault injection techniques. Recently proposed Fault Template Attack (FTA) has shown that without access to any ciphertext of a crypto execution, an adversary can still recover the secret key just by knowing if the computation is faulty or not. Additionally, usage of Authenticated Encryption with Associated Data (AEAD), a kind of symmetric-key operating mode, has gained momentum and become the standard for secret key communications. In this work, we first show how an adversary can very efficiently launch FTA using a combination of the right fault model and proper selection of an encryption block in AEAD operation, where we could recover full master key using 25 percent less fault requirements when compared to classical fault template attack. Then we propose a generic area redundant countermeasure scheme to thwart FTA in AEADs, where our countermeasure enabled circuit occupied only 16 percent additional area than unprotected circuit. We use SUNDAE-GIFT as the benchmark circuit for all our experiments.\",\"PeriodicalId\":207435,\"journal\":{\"name\":\"2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AsianHOST56390.2022.10022108\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AsianHOST56390.2022.10022108","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

故障攻击由于其实用性和广泛的影响,引起了业界和学术界的广泛关注。在对称密钥加密框架下,随着先进的故障注入技术的发展,针对故障攻击的对策设计仍然是一个有待解决的问题。最近提出的故障模板攻击(FTA)表明,攻击者在不访问加密执行的任何密文的情况下,只要知道计算是否错误,仍然可以恢复密钥。此外,AEAD (Authenticated Encryption with Associated Data)作为一种对称密钥操作模式,已成为密钥通信的标准。在这项工作中,我们首先展示了攻击者如何在AEAD操作中使用正确的故障模型和正确选择加密块的组合来非常有效地启动FTA,与传统的故障模板攻击相比,我们可以使用减少25%的故障需求来恢复完整的主密钥。然后,我们提出了一种通用的区域冗余对策方案来阻止aead中的FTA,其中我们的对策使能电路仅占未保护电路的16%的额外面积。我们使用SUNDAE-GIFT作为我们所有实验的基准电路。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
FUNDAE: Fault Template Attack on SUNDAE-GIFT AEAD Scheme
Fault Attacks (FA) have garnered a lot of attention from industry and academic research due to their practical and wide impact. In the framework of symmetric key cryptography, designing countermeasures against fault attacks is still an open problem with recent developments of advanced fault injection techniques. Recently proposed Fault Template Attack (FTA) has shown that without access to any ciphertext of a crypto execution, an adversary can still recover the secret key just by knowing if the computation is faulty or not. Additionally, usage of Authenticated Encryption with Associated Data (AEAD), a kind of symmetric-key operating mode, has gained momentum and become the standard for secret key communications. In this work, we first show how an adversary can very efficiently launch FTA using a combination of the right fault model and proper selection of an encryption block in AEAD operation, where we could recover full master key using 25 percent less fault requirements when compared to classical fault template attack. Then we propose a generic area redundant countermeasure scheme to thwart FTA in AEADs, where our countermeasure enabled circuit occupied only 16 percent additional area than unprotected circuit. We use SUNDAE-GIFT as the benchmark circuit for all our experiments.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信