Combined Fault and Side- Channel Attacks on the AES Key Schedule
François DASSANCE Inside Secure FDTC 2012 09/09/2012 Alexandre VENELLI Inside Secure
Channel Attacks on the AES Key Schedule Franois DASSANCE Inside - - PowerPoint PPT Presentation
Combined Fault and Side- Channel Attacks on the AES Key Schedule Franois DASSANCE Inside Secure Alexandre VENELLI Inside Secure FDTC 2012 09/09/2012 Outline 1. Combined attack 2. Related work on combined attacks Asymmetric
François DASSANCE Inside Secure FDTC 2012 09/09/2012 Alexandre VENELLI Inside Secure
1.
Asymmetric cryptosystems
2.
Symmetric cryptosystems
3.
Roche et al.’s attack on AES
1.
Recursive structure of the key schedule
2.
RCON
3.
Affine transformation
Combined Fault and Side-Channel Attacks on the AES Key Schedule – 09/09/2012 2
Combined Fault and Side-Channel Attacks on the AES Key Schedule – 09/09/2012 3
Combined Fault and Side-Channel Attacks on the AES Key Schedule – 09/09/2012 4
Combined Fault and Side-Channel Attacks on the AES Key Schedule – 09/09/2012 5
Skip instruction
1.
Asymmetric cryptosystems
2.
Symmetric cryptosystems
3.
Roche et al.’s attack on AES
1.
Recursive structure of the key schedule
2.
RCON
3.
Affine transformation
Combined Fault and Side-Channel Attacks on the AES Key Schedule – 09/09/2012 6
─ Amiel, Villegas, Feix, Marcel - 2007
─ Schmidt, Tunstall, Avanzi, Kizhvatov, Kasper, Oswald - 2010
─ Fan, Gierlichs, Vercauteren - 2011
Combined Fault and Side-Channel Attacks on the AES Key Schedule – 09/09/2012 7
─ Robisson, Manet - 2007
─ Clavier, Feix, Gagnerot, Rousselet - 2010
─ Roche, Lomné, Khalfallah - 2011
Combined Fault and Side-Channel Attacks on the AES Key Schedule – 09/09/2012 8
1.
Repeatable fault on the 16 bytes of key state of round 9
2.
Record the power consumption curve
3.
Find a first-order correlation on the computation of the faulted ciphertext
𝑘
𝑘 ⊕ 𝑙10 𝑘
𝑘 ⊕ 𝑙10 𝑘 ⊕ 𝑓10 𝑘
─ 𝑂 faults and 228𝐵 ─ 𝐵 = any DSCA statistical function on 𝑂 curves
Combined Fault and Side-Channel Attacks on the AES Key Schedule – 09/09/2012 9
Combined Fault and Side-Channel Attacks on the AES Key Schedule – 09/09/2012 10
Combined ined attack ack High-orde rder DSCA Number er of curves ves Few and fixed A lot and increasing with the order of masking Complexity lexity of key retrieval rieval algorith rithm 228𝐵 212𝐵
─ Not practical in all AES implementations ─ Not trivial with all fault injection techniques
Combined Fault and Side-Channel Attacks on the AES Key Schedule – 09/09/2012 11
1.
Asymmetric cryptosystems
2.
Symmetric cryptosystems
3.
Roche et al.’s attack on AES
1.
Recursive structure of the key schedule
2.
RCON
3.
Affine transformation
Combined Fault and Side-Channel Attacks on the AES Key Schedule – 09/09/2012 12
─ Recursive structure ─ Use of constant values
─ The number of faults ─ The complexity of the key retrieval algorithm
Combined Fault and Side-Channel Attacks on the AES Key Schedule – 09/09/2012 13
0 = 𝐿8 0 ⊕ 𝑆𝐷𝑃𝑂9 ⊕ 𝑇𝐶 𝐿8 13
1 = 𝐿8 1 ⊕ 𝑇𝐶 𝐿8 14
2 = 𝐿8 2 ⊕ 𝑇𝐶 𝐿8 15
3 = 𝐿8 3 ⊕ 𝑇𝐶 𝐿8 12
𝑘 = 𝐿8 𝑘 ⊕ 𝐿9 𝑘−4 for 4 ≤ 𝑘 ≤ 15
0 in 𝐿9 0 same fault on bytes 4, 8 and 12
0 in 𝐿9 0 𝑓9 0 = 𝑓10 0 = 𝑓10 8 and 𝑓10 4 = 𝑓10 12 = 0
Combined Fault and Side-Channel Attacks on the AES Key Schedule – 09/09/2012 14
─ Loop only on 𝑙10
0 and 𝑓9 0 as 𝑓10 0 = 𝑓9
─ Complexity for this byte: 216𝐵
0 is found 𝑓9 4, 𝑓9 8 and 𝑓9 12 are deduced
─ Simple loop on 𝑙10
𝑘 for 𝑘 = 4,8,12
─ Complexity for each of these 3 bytes: 28𝐵
1, 𝐿9 2 and 𝐿9 3
Combined Fault and Side-Channel Attacks on the AES Key Schedule – 09/09/2012 15
0 = 𝐿8 0 ⊕ 𝑆𝐷𝑃𝑂9 ⊕ 𝑇𝐶 𝐿8 13
4 = 𝐿8 4 ⊕ 𝐿9
8 = 𝐿8 8 ⊕ 𝐿9 4
12 = 𝐿8 12 ⊕ 𝐿9 8
Combined Fault and Side-Channel Attacks on the AES Key Schedule – 09/09/2012 16
Combined Fault and Side-Channel Attacks on the AES Key Schedule – 09/09/2012 17
Combined Fault and Side-Channel Attacks on the AES Key Schedule – 09/09/2012 18
Combined Fault and Side-Channel Attacks on the AES Key Schedule – 09/09/2012 19
─ Same case as before ─ Complexity: 4𝑂 faults and 218 + 3 × 210 𝐵
─
A fault 𝑓𝑇𝑋 on Δ𝑇𝑋 affects round 9 and 10
─
Faulted round 9 key is 𝐿9
𝑘
= 𝐿9
𝑘 ⊕ 𝑓𝑇𝑋 for 0 ≤ 𝑘 ≤ 15
─
Relations between errors on 𝐿10 𝑓10
𝑘+4 = 𝑓10 𝑘+12 = 𝑓10 𝑘 ⊕ 𝑓𝑇𝑋
𝑓10
𝑘+8 = 𝑓10 𝑘 for 𝑘 = 0,1,2,3
─
Complexity: 𝑂 faults and 224 + 3 × 216 + 3 × 210 𝐵
Combined Fault and Side-Channel Attacks on the AES Key Schedule – 09/09/2012 20
─
Same complexity as previous scenario
─
Data path modified relation of key retrieval becomes 𝑇𝐶 𝑇𝐶−1 𝐷𝑗
𝑘 ⊕ 𝑙10 𝑘
⊕ 𝑓9
𝑘 ⊕ 𝑓9 𝑘 ⊕ 𝑙10 𝑘 ⊕ 𝑓10 𝑘
1.
Transient fault: 4𝑂 faults and 212𝐵 (same complexity as classical DSCA)
2.
Permanent fault: 𝑂 faults and 220 + 3 × 210 𝐵
Combined Fault and Side-Channel Attacks on the AES Key Schedule – 09/09/2012 21
1.
Asymmetric cryptosystems
2.
Symmetric cryptosystems
3.
Roche et al.’s attack on AES
1.
Recursive structure of the key schedule
2.
RCON
3.
Affine transformation
Combined Fault and Side-Channel Attacks on the AES Key Schedule – 09/09/2012 22
Atta tack ck # # faults lts # 𝑩
Key state 𝐿9 (Roche et al.)
𝑂 228 Key state 𝐿9 (Roche et al.)
16𝑂 220 Key schedule
4𝑂 218 + 3 × 210 RCON
𝑂 𝑂 1 1 210 216 + 3 × 28 210 216 + 3 × 28 Affine transformation
4𝑂 4𝑂 𝑂 𝑂 212 218 + 3 × 210 220 + 3 × 210 224 + 3 × 216 + 3 × 210
Combined Fault and Side-Channel Attacks on the AES Key Schedule – 09/09/2012 23
1.
Asymmetric cryptosystems
2.
Symmetric cryptosystems
3.
Roche et al.’s attack on AES
1.
Recursive structure of the key schedule
2.
RCON
3.
Affine transformation
Combined Fault and Side-Channel Attacks on the AES Key Schedule – 09/09/2012 24
1.
Store 𝐷 ⊕ 𝑁1 and 𝐷 ⊕ 𝑁2 two ciphertexts of the same message masked with 𝑁1 and 𝑁2
2.
Check 𝐷 ⊕ 𝑁1 ⊕ 𝑁2 =? 𝐷 ⊕ 𝑁2 ⊕ 𝑁1
3.
If no fault, demask and output the ciphertext 𝐷
Combined Fault and Side-Channel Attacks on the AES Key Schedule – 09/09/2012 25
1.
Asymmetric cryptosystems
2.
Symmetric cryptosystems
3.
Roche et al.’s attack on AES
1.
Recursive structure of the key schedule
2.
RCON
3.
Affine transformation
Combined Fault and Side-Channel Attacks on the AES Key Schedule – 09/09/2012 26
Combined Fault and Side-Channel Attacks on the AES Key Schedule – 09/09/2012 27
Combined Fault and Side-Channel Attacks on the AES Key Schedule – 09/09/2012 28