JUST ONE FAULT
Persistent Fault Analysis
- n Block Ciphers
Shivam Bhasin Temasek Labs @ NTU ASK 2018, Kolkata, India 15 Nov 2018
JUST ONE FAULT Persistent Fault Analysis on Block Ciphers Shivam - - PowerPoint PPT Presentation
JUST ONE FAULT Persistent Fault Analysis on Block Ciphers Shivam Bhasin Temasek Labs @ NTU ASK 2018, Kolkata, India 15 Nov 2018 Table of Contents 1. Introduction to Fault Attacks 2. Persistent Fault Analysis (PFA) 3. PFA on Fault
Persistent Fault Analysis
Shivam Bhasin Temasek Labs @ NTU ASK 2018, Kolkata, India 15 Nov 2018
2
What is FIA?
Injection Methods
Impacts
3
4
P k
C
k P C*
Analysis K=f(C,C*)
P1 k
C1*
Analysis K=f(C1*,C2*, ...)
k P2 C2*
5
– Incremental – Sensors to detect physical condition – Redundancy to detect data modification
– Provable – Infect/Correct fault
6
7
1Persistent Fault Analysis. CHES 2018
Joint work with Zhang, Fan, Xiaoxuan Lou, Xinjie Zhao, Wei He, Ruyi Ding, Samiya Qureshi, and Kui Ren 8
9
10
– tmin: find the missing value in Sbox table (x). Then k = tmin x; – t ≠ tmin: find values t where t ≠ tmin and eliminate candidates for k; – tmax: find the value with max probability (x’). Then k = tmax x*
11
PRESENT: n ≥50 AES: n ≥ 1560 n= Minimum no of ciphertext needed by coupon collector’s problem
12
1000 1500 2000 2500 3000 3500 4000 4500 0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 Number of ciphertexts Probability
500 1000 1500 2000 2500 16 32 48 64 80 96 112 128 Sample size Residual key entropy
Practical results Theoretical estimation
navg=2281 1000 experiments n ≈ 2000
13
(1) The attack is not differential in nature and thus the control
(2) The adversary does not necessarily need live synchronization (3) The fault model remains relaxed (no biased faults needed) (4) PFA can also be applied in multiple fault setting (5) PFA can bypass some redundancy based countermeasures (6) An adversary can always inject the persistent fault before the victim is switched to the sensitive mode (1) It needs higher number of ciphertexts as compared to DFA (2) Persistent faults can be detected by some built-in health test mechanism or fault counters.
14
P k k P C = C’? C C’
P k k P’ P= P’? C C’
comparison but not both
REDMR IDDMR
15
Nmin= 1560/0.536= 2910 Navg= 4234 (1000 experiments)
16
uniformly random
random output and correct ciphertext
more ciphertext (n)
attack success
17
– A novel attack on general block ciphers – Defeat popular fault countermeasures – Can work with multiple faults – One one fault injection required
– Used Rowhammer on Intel CPU to attack AES-128 in cryptographic library Libgcrypt
18
– Accepted at DATE 2018 – Target public implementation of higher-order masking with
19