Security analysis and fault injection experiment on AES
نویسندگان
چکیده
Cryptographic circuits are often a foundation of security in nowadays systems. As a consequence, attacks on them are critical and can be used to defeat security policies. In this context, the protection against attacks is a major concern. A fault attack uses a physical perturbation of the circuit in order to obtain faulty computations. These miscomputed results can enable cryptanalysis and reveal secret data. Several cryptosystems are concerned by this type of attacks : RSA [BDL97], DES [BS97] and AES [Gir04][DLV03][PQ03]. The robustness against fault attacks must be evaluated to ensure fault tolerance and security. This can be achieved by injecting faults in the system in order to validate its behavior under fault attacks. It is possible to do this using physical fault [GKT89][AAA+90][MRMS94], but this can also be done using built-in debug mechanisms [FSK97][BPRR98]. Another approach is to use fault injection during simulation to provide robustness evalutation before silicon IC manufacturing in an relatively unexpensive manner. Simulating the circuit permits to inject fault by modifying its description [JAR+94][LH00][ZME03] or to add a custom fault injector in the design [FMR06]. Our approach is to use an unmodified description of the circuit to be very accurate regarding to the corresponding physical circuit. However, some properties of cryptographic algorithm can be used to predict the temporal sensitivity of circuits. In this paper, we propose a metric of sensitivity against fault attacks for circuits and validate it using fault injection in simulation on AES. This paper is organized as follows : the algorithm AES and its implementation is introduced in section 2. We describe our analysis of sensitivity in section 3 and apply it to AES. Then, we present our injection methodology and tool in section 4. To conclude, future work is described in section 5.
منابع مشابه
Security Analysis of AES Using Functionality Fault Model
Security of cryptographic circuits is a major concern. Smartcards are targeted by sophisticated attacks like fault attacks that combine physical disturbance and cryptanalysis. We propose a methodology and a tool (PAFI) to analyse the robustness of circuits under fault attacks using fault injection in simulation. The number of injection is reduced by taking into account the function of the latch...
متن کاملMulti-level Aes Design Security: from Systemc-tlm to Fpga
Advanced Encryption Standard (AES) cryptographic system are widely used in embedded systems to secure secret information. One of the most powerful cryptanalysis techniques against the cryptographic systems is the fault injection attacks. The complexity of cryptographic systems is increasing which requires fast security attacks simulation against fault injection attacks. The multi-level Electron...
متن کاملAn Information Theoretic Perspective on the Differential Fault Analysis against AES
Differential Fault Analysis against AES has been actively studied these years. Based on similar assumptions of the fault injection, different DFA attacks against AES have been proposed. However, it is difficult to understand how different attack results are obtained for the same fault injection. It is also difficult to understand the relationship between similar assumptions of fault injection a...
متن کاملNon-invasive Trigger-free Fault Injection Method Based on Intentional Electromagnetic Interference
This paper presents a new type of fault injection method based on intentional electromagnetic interference (IEMI), which causes information leakage from cryptographic devices without disrupting their operations or damaging their physical structures. The basic principle is to transmit a sinusoidal EM wave via a power/communication cable or an antenna. The IEMI-based fault injection method is per...
متن کاملDifferential Fault Analysis for Round - Reduced AES by Fault Injection
© 2011 ETRI Journal, Volume 33, Number 3, June 2011 This paper presents a practical differential fault analysis method for the faulty Advanced Encryption Standard (AES) with a reduced round by means of a semi-invasive fault injection. To verify our proposal, we implement the AES software on the ATmega128 microcontroller as recommended in the standard document FIPS 197. We reduce the number of r...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007