differential fault analysis of trivium
play

Differential Fault Analysis of Trivium Michal Hojsk 1 , 3 and - PowerPoint PPT Presentation

Differential Fault Analysis of Trivium Michal Hojsk 1 , 3 and Bohuslav Rudolf 2 , 3 1The Selmer Center, University of Bergen, Norway 2National Security Authority, Czech Republic 3Department of Algebra, Charles University in Prague, Czech


  1. Differential Fault Analysis of Trivium Michal Hojsík 1 , 3 and Bohuslav Rudolf 2 , 3 1The Selmer Center, University of Bergen, Norway 2National Security Authority, Czech Republic 3Department of Algebra, Charles University in Prague, Czech Republic Fast Software Encryption 2008 February 10-13, Lausanne Michal Hojsík and Bohuslav Rudolf () Differential Fault Analysis of Trivium Fast Software Encryption 2008 1 / 13

  2. Talk outline Talk outline Trivium description Differential fault analysis Differential fault analysis of Trivium Experimental results Michal Hojsík and Bohuslav Rudolf () Differential Fault Analysis of Trivium Fast Software Encryption 2008 2 / 13

  3. Trivium Trivium Hardware oriented additive synchronous stream cipher Designed by de Cannière and Preneel in 2005 for eSTREAM Project Very fast in hardware and software 80-bit secret key and 80-bit initialisation vector Consists of 3 non-linear shift registers 288 bit inner state Michal Hojsík and Bohuslav Rudolf () Differential Fault Analysis of Trivium Fast Software Encryption 2008 3 / 13

  4. Trivium Cipher description Trivium Description Inner state IS = ( s 1 , . . . , s 288 ) Keystream generation algorithm: ✲ ❢ q ✻ ✲ s 1 s 66 s 69 s 91 s 92 s 93 ❄ ❄ ✛ ✲ ✲ ❢ ❢ ❵ ❢ ✛ ✻ ❢ ❄ ✲ q ✲ ✲ z i ✻ ❢ ❢ ✻ ✻ ✲ s 94 s 162 s 171 s 175 s 176 s 177 ❄ ❄ ✲ ✲ ❢ ❵ ❢ ✛ ❢ ✲ ✻ ❢ q ✻ ✲ s 178 s 243 s 264 s 286 s 287 s 288 ❄ ❄ ✲ ✲ ❵ ❢ ❢ Michal Hojsík and Bohuslav Rudolf () Differential Fault Analysis of Trivium Fast Software Encryption 2008 4 / 13

  5. Trivium Cipher description Trivium Description Secret key K = ( K 1 , . . . , K 80 ) , initialisation vector IV = ( IV 1 , . . . , IV 80 ) Initialisation algorithm = 1152 loops of the keystream gen. alg. without output ✲ ❢ ✻ ✲ K 1 K 80 0 0 · · · · · · ❄ ✲ ❄ ✛ ✲ ❢ ❢ ❵ ❢ ✛ ✻ ❢ ✲ ✻ ❢ ✻ ✲ IV 1 IV 80 0 0 · · · · · · ❄ ✲ ❄ ✲ ❵ ❢ ❢ ✛ ❢ ✲ ✻ ❢ ✻ ✲ 0 1 1 1 0 · · · ❄ ✲ ❄ ✲ ❵ ❢ ❢ Michal Hojsík and Bohuslav Rudolf () Differential Fault Analysis of Trivium Fast Software Encryption 2008 4 / 13

  6. Differential Fault Analysis General overview Differential Fault Analysis - DFA Type of active side-channel attack - adversary actively interferes with a cryptosystem First used in 1996 by Boneh et al. for RSA and by Biham and Shamir for DES Results on stream ciphers, e.g. Hoch, Shamir 2004 – Fault Analysis of LFSR based ciphers, Lili128, Sober-t32 Biham, Grandboulan 2005 – Impossible Fault Analysis of RC4 Michal Hojsík and Bohuslav Rudolf () Differential Fault Analysis of Trivium Fast Software Encryption 2008 5 / 13

  7. Differential Fault Analysis Attack model DFA Attack Model General DFA attack model: Attacker is able to inject a fault into a cipher inner state or intermediate result Attacker has only partial control over their number, location, timing ... Attacker can reset the device to its original state and repeat fault injection Our assumptions: Attacker is able to: obtain first n consecutive bits of (proper) keystream { z i } produced out of a state IS t inject exactly one fault (bit flip) into IS t at random position → faulty inner state IS ′ t obtain first n consecutive bits of faulty keystream { z ′ i } produced out of IS ′ t repeat the fault injection into the same inner state IS t m times Can be achieved in the Chosen ciphertext attack scenario Michal Hojsík and Bohuslav Rudolf () Differential Fault Analysis of Trivium Fast Software Encryption 2008 6 / 13

  8. Trivium DFA Fault Injection Fault Injection - Trivium Attack is based on the simplicity of the Trivium feedback functions Attack uses simple equation ( x + 1 ) · y + x · y = y ✲ ❡ q ✻ ✲ s 1 s 40 s 66 s 69 s 91 s 92 s 93 ❄ ❄ ✛ ✲ ✲ ❡ ❵ ❡ ❡ ✛ ✻ ❄ ❡ ✲ q ✲ ✲ z i ✻ ❡ ❡ ✲ s 94 ✻ ✻ s 162 s 171 s 175 s 176 s 177 ❄ ❄ ✲ ✲ ❵ ❡ ❡ ✛ ❡ ✲ ✻ ❡ q ✲ s 178 ✻ s 243 s 264 s 286 s 287 s 288 ❄ ❄ ✲ ✲ ❵ ❡ ❡ Michal Hojsík and Bohuslav Rudolf () Differential Fault Analysis of Trivium Fast Software Encryption 2008 7 / 13

  9. Trivium DFA Fault Injection Fault Injection - Trivium Attack is based on the simplicity of the Trivium feedback functions Attack uses simple equation ( x + 1 ) · y + x · y = y ✲ ❡ q ✻ ✲ + 1 · · · · · · ❄ ❄ ✛ ✲ ✲ ❡ ❵ ❡ ❡ ✛ ✻ ❄ ❡ ✲ q ✲ ✲ · ✻ ❡ ❡ ✲ ✻ ✻ · · · · · · ❄ ❄ ✲ ✲ ❡ ❵ ❡ ✛ ❡ ✲ ✻ ❡ q ✲ ✻ · · · · · · ❄ ❄ ✲ ✲ ❡ ❵ ❡ Michal Hojsík and Bohuslav Rudolf () Differential Fault Analysis of Trivium Fast Software Encryption 2008 7 / 13

  10. Trivium DFA Fault Injection Fault Injection - Trivium Attack is based on the simplicity of the Trivium feedback functions Attack uses simple equation ( x + 1 ) · y + x · y = y ✲ ❡ q ✻ ✲ + 1 · · · · · ❄ ❄ ✛ ✲ ✲ ❡ ❡ ❵ ❡ ✛ ✻ ❄ ❡ ✲ q ✲ ✲ + 1 ✻ ❡ ❡ ✲ + 1 ✻ ✻ · · · · · ❄ ❄ ✲ ✲ ❡ ❵ ❡ ✛ ❡ ✲ ✻ ❡ q ✲ ✻ · · · · · · ❄ ❄ ✲ ✲ ❵ ❡ ❡ Michal Hojsík and Bohuslav Rudolf () Differential Fault Analysis of Trivium Fast Software Encryption 2008 7 / 13

  11. Trivium DFA Fault Injection Fault Injection - Trivium Attack is based on the simplicity of the Trivium feedback functions Attack uses simple equation ( x + 1 ) · y + x · y = y ✲ ❡ q ✻ ✲ + 1 + 1 · · · · ❄ ❄ ✛ ✲ ✲ ❡ ❵ ❡ ❡ ✛ ✻ ❄ ❡ ✲ q ✲ ✲ · ✻ ❡ ❡ ✲ ✻ ✻ + 1 · · · · · · ❄ ❄ ✲ ✲ ❡ ❵ ❡ ✛ ❡ ✲ ✻ ❡ q ✲ ✻ · · · · · · ❄ ❄ ✲ ✲ ❵ ❡ ❡ Michal Hojsík and Bohuslav Rudolf () Differential Fault Analysis of Trivium Fast Software Encryption 2008 7 / 13

  12. Trivium DFA Fault Injection Fault Injection - Trivium Attack is based on the simplicity of the Trivium feedback functions Attack uses simple equation ( s 40 + 1 ) · s 41 + s 40 · s 41 = s 41 ✲ ❡ q ✻ ✲ · · + 1 + 1 · · · ❄ ❄ ✛ ✲ ✲ ❡ ❵ ❡ ❡ ✛ ✻ ❄ ❡ ✲ q ✲ ✲ · ✻ ❡ ❡ ✲ s 41 ✻ ✻ + 1 · · · · · ❄ ❄ ✲ ✲ ❡ ❵ ❡ ✛ ❡ ✲ ✻ ❡ q ✲ ✻ · · · · · · ❄ ❄ ✲ ✲ ❡ ❵ ❡ Michal Hojsík and Bohuslav Rudolf () Differential Fault Analysis of Trivium Fast Software Encryption 2008 7 / 13

  13. Trivium DFA Fault Injection Fault Injection - Trivium Attack is based on the simplicity of the Trivium feedback functions Attack uses simple equation s 39 · ( s 40 + 1 ) + s 39 · s 40 = s 39 ✲ ❡ q ✻ ✲ · · + 1 + 1 · · · ❄ ❄ ✛ ✲ ✲ ❡ ❵ ❡ ❡ ✛ ✻ ❄ ❡ ✲ q ✲ ✲ · ✻ ❡ ❡ ✲ s 39 ✻ ✻ s 41 + 1 · · · · · ❄ ❄ ✲ ✲ ❵ ❡ ❡ ✛ ❡ ✲ ✻ ❡ q ✲ ✻ · · · · · · ❄ ❄ ✲ ✲ ❵ ❡ ❡ Michal Hojsík and Bohuslav Rudolf () Differential Fault Analysis of Trivium Fast Software Encryption 2008 7 / 13

  14. Trivium DFA Attack Description Attack Description I Core of the attack - solve a system of equations in the inner state bits IS t = ( s 1 , . . . , s 288 ) Use equations given by the (proper) keystream { z i } Use differential fault analysis to obtain more equations Precomputation: for each fault position e , 1 ≤ e ≤ 288 express first n delta-keystream bits as expression is ( s 1 , . . . , s 288 ) store the equations in a table Fault position determination: distance between the output bits differs for each register compute the distances between nonzero bits of a keystream difference determine the fault position - table lookup Michal Hojsík and Bohuslav Rudolf () Differential Fault Analysis of Trivium Fast Software Encryption 2008 8 / 13

  15. Trivium DFA Attack Description Attack Description III Attack algorithm: - obtain the proper keystream generated from IS t - insert the keystream equations into the system while solution not found - reset the cipher to the state IS t - insert a fault into IS t at random position - obtain the faulty keystream - determine the fault position - insert delta keystream equations into the system - try to solve the system end while - clock Trivium backwards until initial state reached - read the secret key and IV Michal Hojsík and Bohuslav Rudolf () Differential Fault Analysis of Trivium Fast Software Encryption 2008 9 / 13

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend