Reduction in the Number of Fault Injections for Blind Fault Attack on SPN Block Ciphers

2017 ◽  
Vol 16 (2) ◽  
pp. 1-20 ◽  
Author(s):  
Yang Li ◽  
Mengting Chen ◽  
Zhe Liu ◽  
Jian Wang
Author(s):  
Roman Korkikian ◽  
Sylvain Pelissier ◽  
David Naccache
Keyword(s):  

Author(s):  
Fan Zhang ◽  
Xiaoxuan Lou ◽  
Xinjie Zhao ◽  
Shivam Bhasin ◽  
Wei He ◽  
...  

Persistence is an intrinsic nature for many errors yet has not been caught enough attractions for years. In this paper, the feature of persistence is applied to fault attacks, and the persistent fault attack is proposed. Different from traditional fault attacks, adversaries can prepare the fault injection stage before the encryption stage, which relaxes the constraint of the tight-coupled time synchronization. The persistent fault analysis (PFA) is elaborated on different implementations of AES-128, specially fault hardened implementations based on Dual Modular Redundancy (DMR). Our experimental results show that PFA is quite simple and efficient in breaking these typical implementations. To show the feasibility and practicability of our attack, a case study is illustrated on the shared library Libgcrypt with rowhammer technique. Approximately 8200 ciphertexts are enough to extract the master key of AES-128 when PFA is applied to Libgcrypt1.6.3 with redundant encryption based DMR. This work puts forward a new direction of fault attacks and can be extended to attack other implementations under more interesting scenarios.


2009 ◽  
Vol 20 (3) ◽  
pp. 682-691
Author(s):  
Pin LIN ◽  
Wen-Ling WU ◽  
Chuan-Kun WU
Keyword(s):  

2009 ◽  
Vol 32 (4) ◽  
pp. 595-601 ◽  
Author(s):  
Hua CHEN ◽  
Deng-Guo FENG ◽  
Li-Min FAN

2021 ◽  
pp. 1-1
Author(s):  
Piljoo Choi ◽  
Wonbae Kong ◽  
Ji-Hoon Kim ◽  
Mun-Kyu Lee ◽  
Dong Kyue Kim
Keyword(s):  

IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 37697-37706
Author(s):  
Haoxiang Luo ◽  
Weijian Chen ◽  
Xinyue Ming ◽  
Yifan Wu

Sign in / Sign up

Export Citation Format

Share Document