...
首页> 外文期刊>IEEE transactions on information forensics and security >Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-Like Block Ciphers
【24h】

Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-Like Block Ciphers

机译:故障空间转换:一种类似AES密码算法的反差分故障分析和差分故障强度分析的通用方法

获取原文
获取原文并翻译 | 示例
           

摘要

Classical fault attacks, such as differential fault analysis(DFA) as well as biased fault attacks, such as the differential fault intensity analysis (DFIA), have been a major threat to cryptosystems in recent times. DFA uses pairs of fault-free and faulty ciphertexts to recover the secret key. DFIA, on the other hand, combines principles of side-channel analysis and fault attacks to try and extract the key using faulty ciphertexts only. Till date, no effective countermeasure that can thwart both DFA- as well as DFIA-based attacks has been reported in the literature to the best of our knowledge. In particular, traditional redundancy-based countermeasures that assume uniform fault distributions are found to be vulnerable against the DFIA due to its use of biased fault models. In this paper, we propose a novel generic countermeasure strategy that combines the principles of redundancy with that of fault space transformation to achieve security against both DFA- and DFIA-based attacks on AES-like block ciphers. As a case study, we have applied our proposed technique to obtain temporal and spatial redundancy-based countermeasures for AES-128, and have evaluated their security against both DFA and DFIA via practical experiments on a SASEBO-GII board. Results show that our proposed countermeasure makes it practically infeasible to obtain a single instance of successful fault injection, even in the presence of biased fault models.
机译:诸如差分故障分析(DFA)之类的经典故障攻击以及诸如差分故障强度分析(DFIA)之类的有偏故障攻击已成为最近对密码系统的主要威胁。 DFA使用成对的无故障和错误密文恢复密钥。另一方面,DFIA结合了边信道分析和故障攻击的原理,仅尝试使用错误的密文来尝试提取密钥。迄今为止,据我们所知,尚无文献报道可以阻止DFA和基于DFIA的攻击的有效对策。特别是,发现传统的基于冗余的对策(假设其具有统一的故障分布)由于使用了偏向故障模型而容易受到DFIA的攻击。在本文中,我们提出了一种新颖的通用对策策略,该策略将冗余原理与故障空间转换原理相结合,以实现针对类似AES的分组密码的基于DFA和DFIA的攻击的安全性。作为案例研究,我们已将我们提出的技术应用于针对AES-128的基于时间和空间冗余的对策,并通过在SASEBO-GII板上进行的实际实验评估了它们针对DFA和DFIA的安全性。结果表明,即使存在有偏差的故障模型,我们提出的对策也使得实际上不可能获得成功的故障注入的单个实例。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号