SIFA Statistical Ineffective Fault Attacks Rump Session at CHES - - PowerPoint PPT Presentation

sifa
SMART_READER_LITE
LIVE PREVIEW

SIFA Statistical Ineffective Fault Attacks Rump Session at CHES - - PowerPoint PPT Presentation

SIFA Statistical Ineffective Fault Attacks Rump Session at CHES 2018 Based on work of: Christoph Dobraunig, Maria Eichlseder, Hannes Gro, Thomas Korak, Stefan Mangard, Florian Mendel, Robert Primas Are Protected Implementations Hard to


slide-1
SLIDE 1

SIFA

Statistical Ineffective Fault Attacks

Rump Session at CHES 2018 Based on work of: Christoph Dobraunig, Maria Eichlseder, Hannes Groß, Thomas Korak, Stefan Mangard, Florian Mendel, Robert Primas

slide-2
SLIDE 2

Are Protected Implementations Hard to Attack?

E P C

1 / 6

slide-3
SLIDE 3

Are Protected Implementations Hard to Attack?

E P C

1 / 6

slide-4
SLIDE 4

Are Protected Implementations Hard to Attack?

E P C E E E E =

1 / 6

slide-5
SLIDE 5

Are Protected Implementations Hard to Attack?

E P C E E E E =

SIFA can attack masked implementations of arbitrary order and with arbitrary error detection capabilities

single fault per execution of the primitive typically effort does not significantly increase with higher protection order

1 / 6

slide-6
SLIDE 6

Path to SIFA

Statistical Ineffective Fault Attacks

([DEKMMP18], [DEGMMP18])

Statistical Fault Attacks

([FJLT13], [DEKLM16])

Ineffective Fault Attacks

([Cla07])

2 / 6

slide-7
SLIDE 7

Where to Fault?

Instruction 1 Instruction 688 Masked S-box Susceptible Not Susceptible

Example of masked AES in Software [SS16] and byte-stuck-at-0

3 / 6

slide-8
SLIDE 8

Which Fault Models?

Successful attacks when we:

Flip one bit Set one bit to zero Randomize one bit Flip one byte Set one byte to zero Randomize one byte Skip an instruction ...

4 / 6

slide-9
SLIDE 9

Which Fault Models?

Successful attacks when we:

Flip one bit Set one bit to zero Randomize one bit Flip one byte Set one byte to zero Randomize one byte Skip an instruction ...

4 / 6

slide-10
SLIDE 10

Which Fault Models?

Successful attacks when we:

Flip one bit Set one bit to zero Randomize one bit Flip one byte Set one byte to zero Randomize one byte Skip an instruction ...

4 / 6

slide-11
SLIDE 11

Which Fault Models?

Successful attacks when we:

Flip one bit Set one bit to zero Randomize one bit Flip one byte Set one byte to zero Randomize one byte Skip an instruction ...

4 / 6

slide-12
SLIDE 12

Which Fault Models?

Successful attacks when we:

Flip one bit Set one bit to zero Randomize one bit Flip one byte Set one byte to zero Randomize one byte Skip an instruction ...

4 / 6

slide-13
SLIDE 13

Which Fault Models?

Successful attacks when we:

Flip one bit Set one bit to zero Randomize one bit Flip one byte Set one byte to zero Randomize one byte Skip an instruction ...

4 / 6

slide-14
SLIDE 14

Which Fault Models?

Successful attacks when we:

Flip one bit Set one bit to zero Randomize one bit Flip one byte Set one byte to zero Randomize one byte Skip an instruction ...

4 / 6

slide-15
SLIDE 15

Thank you

https://eprint.iacr.org/2018/071 https://eprint.iacr.org/2018/357

5 / 6

slide-16
SLIDE 16

Bibliography I

[Cla07]

  • C. Clavier

Secret External Encodings Do Not Prevent Transient Fault Analysis Cryptographic Hardware and Embedded Systems – CHES 2007 [DEGMMP18]

  • C. Dobraunig, M. Eichlseder, H. Gross, S. Mangard, F. Mendel, and R. Primas

Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures To appear at ASIACRYPT 2018, 2018 [DEKLM16]

  • C. Dobraunig, M. Eichlseder, T. Korak, V. Lomn´

e, and F. Mendel Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes Advances in Cryptology – ASIACRYPT 2016 [DEKMMP18]

  • C. Dobraunig, M. Eichlseder, T. Korak, S. Mangard, F. Mendel, and R. Primas

SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography IACR Transactions on Cryptographic Hardware and Embedded Systems 2018:3, 2018

slide-17
SLIDE 17

Bibliography II

[FJLT13]

  • T. Fuhr, ´
  • E. Jaulmes, V. Lomn´

e, and A. Thillard Fault Attacks on AES with Faulty Ciphertexts Only Fault Diagnosis and Tolerance in Cryptography – FDTC 2013 [SS16]

  • P. Schwabe and K. Stoffelen

All the AES You Need on Cortex-M3 and M4 Selected Areas in Cryptography – SAC 2016