statistical ineffective fault attacks on masked aes with
play

Statistical Ineffective Fault Attacks on Masked AES with Fault - PowerPoint PPT Presentation

Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures Christoph Dobraunig, Maria Eichlseder, Hannes Gross, Stefan Mangard, Florian Mendel, Robert Primas ASIACRYPT 2018 IAIK - Graz University of Technology www.tugraz.at


  1. Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures Christoph Dobraunig, Maria Eichlseder, Hannes Gross, Stefan Mangard, Florian Mendel, Robert Primas ASIACRYPT 2018 IAIK - Graz University of Technology

  2. www.tugraz.at Motivation Building cryptographic implementations is challenging: 1 Robert Primas — IAIK - Graz University of Technology

  3. www.tugraz.at Motivation Building cryptographic implementations is challenging: • Requires usage of proper cryptographic primitives 1 Robert Primas — IAIK - Graz University of Technology

  4. www.tugraz.at Motivation Building cryptographic implementations is challenging: • Requires usage of proper cryptographic primitives • But often also the usage of additional defenses ... • Microcontroller • FPGAs • ASICs 1 Robert Primas — IAIK - Graz University of Technology

  5. www.tugraz.at Motivation Building cryptographic implementations is challenging: • Requires usage of proper cryptographic primitives • But often also the usage of additional defenses ... • Microcontroller • FPGAs • ASICs • ... because of implementation attacks 1 Robert Primas — IAIK - Graz University of Technology

  6. www.tugraz.at Motivation • Proper cryptography does not mean practical security 2 Robert Primas — IAIK - Graz University of Technology

  7. www.tugraz.at Motivation • Proper cryptography does not mean practical security • Every cryptographic implementation stores a secret 2 Robert Primas — IAIK - Graz University of Technology

  8. www.tugraz.at Motivation • Proper cryptography does not mean practical security • Every cryptographic implementation stores a secret • Secrets can be extracted by: Power Analysis Fault Attacks 2 Robert Primas — IAIK - Graz University of Technology

  9. Fault Attacks 3 Robert Primas — IAIK - Graz University of Technology

  10. www.tugraz.at Fault Attacks • Get physical access to target device: P • Set plaintexts • Observe ciphertexts ENC C 4 Robert Primas — IAIK - Graz University of Technology

  11. www.tugraz.at Fault Attacks • Get physical access to target device: P • Set plaintexts • Observe ciphertexts • Cause erroneous computations via: • Clock glitches ENC • Voltage glitches • Lasers C 4 Robert Primas — IAIK - Graz University of Technology

  12. www.tugraz.at Fault Attacks • Get physical access to target device: P • Set plaintexts • Observe ciphertexts • Cause erroneous computations via: • Clock glitches ENC ENC • Voltage glitches • Lasers • Observe faulty and correct ciphertext C C 4 Robert Primas — IAIK - Graz University of Technology

  13. www.tugraz.at Fault Attacks • Get physical access to target device: P • Set plaintexts • Observe ciphertexts • Cause erroneous computations via: • Clock glitches ENC ENC • Voltage glitches • Lasers • Observe faulty and correct ciphertext • Recover key C C 4 Robert Primas — IAIK - Graz University of Technology

  14. www.tugraz.at Fault Attacks • Get physical access to target device: P • Set plaintexts • Observe ciphertexts • Cause erroneous computations via: • Clock glitches ENC ENC • Voltage glitches • Lasers • Observe faulty and correct ciphertext • Recover key C C ⇒ Differential Fault Attack (DFA) 4 Robert Primas — IAIK - Graz University of Technology

  15. www.tugraz.at Fault Countermeasures - Detection P P ENC ENC • Use redundancy to detect faults ENC-DETECT ENC ENC C C C C C 5 Robert Primas — IAIK - Graz University of Technology

  16. www.tugraz.at Fault Countermeasures - Detection P P ENC ENC • Use redundancy to detect faults ENC-DETECT ENC ENC • Fault detected → No ciphertext C C C C ... 5 Robert Primas — IAIK - Graz University of Technology

  17. www.tugraz.at Fault Countermeasures - Detection P P ENC ENC • Use redundancy to detect faults ENC-DETECT ENC ENC • Fault detected → No ciphertext • 2 identical faults necessary for attack C C C C C 5 Robert Primas — IAIK - Graz University of Technology

  18. www.tugraz.at Fault Countermeasures - Detection P P ENC ENC • Use redundancy to detect faults ENC-DETECT ENC ENC • Fault detected → No ciphertext • 2 identical faults necessary for attack C C → More redundancy, Enc-Dec, etc... C C C 5 Robert Primas — IAIK - Graz University of Technology

  19. www.tugraz.at Statistical Ineffective Fault Attacks (SIFA) • We presented SIFA at CHES 2018: • Breaks detection countermeasures (any degree of redundancy) • Breaks infection countermeasures • Requires just a single fault injection per encryption • Require no precise knowledge about location and effect of the fault 6 Robert Primas — IAIK - Graz University of Technology

  20. www.tugraz.at Statistical Ineffective Fault Attacks (SIFA) • We presented SIFA at CHES 2018: • Breaks detection countermeasures (any degree of redundancy) • Breaks infection countermeasures • Requires just a single fault injection per encryption • Require no precise knowledge about location and effect of the fault • We demonstrated applicability to AE schemes at SAC 2018 6 Robert Primas — IAIK - Graz University of Technology

  21. www.tugraz.at Statistical Ineffective Fault Attacks (SIFA) • We presented SIFA at CHES 2018: • Breaks detection countermeasures (any degree of redundancy) • Breaks infection countermeasures • Requires just a single fault injection per encryption • Require no precise knowledge about location and effect of the fault • We demonstrated applicability to AE schemes at SAC 2018 • What about power analysis countermeasures? 6 Robert Primas — IAIK - Graz University of Technology

  22. www.tugraz.at SIFA on AES in Pictures P P 1...N P 1...N P 1...N P 1...N P 1...N P 1...N P 1...N P 1...N : : : : : : : : ROUND 10 ROUND 9 ROUND 8 ROUND 10 ROUND 9 ROUND 8 ROUND 10 ROUND 9 ROUND 8 ROUND 10 ROUND 9 ROUND 8 ROUND 10 ROUND 9 ROUND 8 ROUND 10 ROUND 9 ROUND 8 ROUND 10 ROUND 9 ROUND 8 ROUND 10 ROUND 9 ROUND 8 SHIFT ROWS SHIFT ROWS SHIFT ROWS SHIFT ROWS SHIFT ROWS SHIFT ROWS SHIFT ROWS SHIFT ROWS MIX COLUMNS MIX COLUMNS MIX COLUMNS MIX COLUMNS MIX COLUMNS MIX COLUMNS MIX COLUMNS MIX COLUMNS KEY ADD 8 KEY ADD 8 KEY ADD 8 KEY ADD 8 KEY ADD 8 KEY ADD 8 KEY ADD 8 KEY ADD 8 SUB BYTES SUB BYTES SUB BYTES SUB BYTES SUB BYTES SUB BYTES SUB BYTES SUB BYTES ? SHIFT ROWS SHIFT ROWS SHIFT ROWS SHIFT ROWS SHIFT ROWS SHIFT ROWS SHIFT ROWS SHIFT ROWS MIX COLUMNS MIX COLUMNS MIX COLUMNS MIX COLUMNS MIX COLUMNS MIX COLUMNS MIX COLUMNS MIX COLUMNS KEY ADD 9 KEY ADD 9 KEY ADD 9 KEY ADD 9 KEY ADD 9 KEY ADD 9 KEY ADD 9 KEY ADD 9 SUB BYTES SUB BYTES SUB BYTES SUB BYTES SUB BYTES SUB BYTES SUB BYTES SUB BYTES SHIFT ROWS SHIFT ROWS SHIFT ROWS SHIFT ROWS SHIFT ROWS SHIFT ROWS SHIFT ROWS SHIFT ROWS KEY ADD 10 KEY ADD 10 KEY ADD 10 KEY ADD 10 KEY ADD 10 KEY ADD 10 KEY ADD 10 KEY ADD 10 C C C C C C N C N C N C C C C C N C N C N C 2 C C C C C N C N C N C C C C C N C N C N C N C N C N C N C N C N C N C N 7 Robert Primas — IAIK - Graz University of Technology

  23. www.tugraz.at SIFA on AES in Pictures P P 1...N P 1...N P 1...N P 1...N : : : : ROUND 10 ROUND 9 ROUND 8 ROUND 10 ROUND 9 ROUND 8 ROUND 10 ROUND 9 ROUND 8 ROUND 10 ROUND 9 ROUND 8 SHIFT ROWS SHIFT ROWS SHIFT ROWS SHIFT ROWS MIX COLUMNS MIX COLUMNS MIX COLUMNS MIX COLUMNS KEY ADD 8 KEY ADD 8 KEY ADD 8 KEY ADD 8 SUB BYTES SUB BYTES SUB BYTES SUB BYTES ? SHIFT ROWS SHIFT ROWS SHIFT ROWS SHIFT ROWS MIX COLUMNS MIX COLUMNS MIX COLUMNS MIX COLUMNS KEY ADD 9 KEY ADD 9 KEY ADD 9 KEY ADD 9 SUB BYTES SUB BYTES SUB BYTES SUB BYTES SHIFT ROWS SHIFT ROWS SHIFT ROWS SHIFT ROWS KEY ADD 10 KEY ADD 10 KEY ADD 10 KEY ADD 10 C C C C C C C C C C C C C C C C C C N C N C N C N 7 Robert Primas — IAIK - Graz University of Technology

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend