Research on Fault-Electromagnetic Attack on Block Cipher
نویسندگان
چکیده
It is one of the important factors in iterative block ciphers design that proper rounds are used to resist differential analysis, linear analysis and many other kinds of attack. Block ciphers usually adopt loop codes in software and repetition structures in hardware in order to reduce complexity and cost. This paper presents an effective fault-electromagnetic attack which can change the rounds of block ciphers in running process, by inducing appropriate fault to the cryptographic chip. The executing rounds of the attacked block cipher can be detected from the electromagnetic radiation track of cryptographic chip. Then the secret key can be deduced directly or with simple mathematical analysis. The simulation result of lightweight block cipher PRESENT shows that the suggested attack is feasible and efficient, when it is implemented with single chip microcomputer. Furthermore, countermeasures are given to resist this kind of attack.
منابع مشابه
New Fixed Point Attacks on GOST2 Block Cipher
GOST block cipher designed in the 1970s and published in 1989 as the Soviet and Russian standard GOST 28147-89. In order to enhance the security of GOST block cipher after proposing various attacks on it, designers published a modified version of GOST, namely GOST2, in 2015 which has a new key schedule and explicit choice for S-boxes. In this paper, by using three exactly identical portions of ...
متن کاملDifferential Fault Attack on the PRINCE Block Cipher
PRINCE is a new lightweight block cipher proposed at the ASIACRYPT’2012 conference. In this paper two observations on the linear layer of the cipher are presented. Based on the observations a differential fault attack is applied to the cipher under a random nibblelevel fault model. The attack uniquely determines the 128-bit key of the cipher using less than 7 fault injections averagely. In the ...
متن کاملNew differential fault analysis on PRESENT
In this paper, we present two differential fault analyses on PRESENT-80 which is a lightweight block cipher. The first attack is a basic attack which induces a fault on only one bit of intermediate states, and we can obtain the last subkey of the block cipher, given 48 faulty cipher texts on average. The second attack can retrieve the master key of the block cipher, given 18 faulty cipher texts...
متن کاملDifferential Fault Analysis on Block Cipher Piccolo
Piccolo is a 64-bit block cipher suitable for the constrained environments such as wireless sensor network environments. In this paper, we propose differential fault analysis on Piccolo. Based on a random byte fault model, our attack can recover the secret key of Piccolo-80 by using an exhaustive search of 2 and six random byte fault injections on average. It can be simulated on a general PC wi...
متن کاملMulti-Stage Fault Attacks on Block Ciphers
This paper introduces Multi-Stage Fault Attacks, which allow Differential Fault Analysis of block ciphers having independent subkeys. Besides the specification of an algorithm implementing the technique, we show concrete applications to LED-128 and PRINCE and demonstrate that in both cases approximately 3 to 4 fault-injections are enough to reconstruct the full 128-bit key. Keywords-cryptanalys...
متن کامل