
Biased Fault Attack on Time Redundancy Countermeasure for AES
This study presents a biased fault attack on the time redundancy countermeasure for AES-128, developing biased fault models to undermine the countermeasure, with simulations and experiments to validate the proposed attacks. The research explores the impact of bias quantification, adversarial strategies, and fault models on the effectiveness of the AES security mechanism.
Uploaded on | 0 Views
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
COSADE 2015 A Biased Fault Attack on the Time Redundancy Countermeasure for AES Sikhar Patranabis, Abhishek Chakraborty, Phuong Ha Nguyen and Debdeep Mukhopadhyay Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur
Outline Objectives The Time Redundancy Countermeasure Bias Quantification and Adversarial strategy Fault Model and Fault Injection Set-Up Performed Attacks Simulation Studies Experimental Results Conclusions COSADE 2015 2
Objectives 1. To develop a formulation for the degree of bias in a fault model 2. Propose biased fault models to attack the time redundancy countermeasure for AES-128 3. Establish the feasibility of the proposed attacks via simulations and real life experiments COSADE 2015 3
Introduction: Time Redundancy Time Redundancy - A Classical Fault Tolerance Technique Each operation is followed by a redundant operation and outputs are matched Output is suppressed or randomized in case of a mismatch COSADE 2015 4 Program Flow
Against Fault Attacks : Detection Success Failure Identical Faults in both rounds goes undetected COSADE 2015 5
Uniform Fault Model All faults under the fault model are equally likely Fault collision probability for two random fault injections is low Large number of fault injections necessary to get auseful ciphertext COSADE 2015 6
Beating the Countermeasure Improving fault collision probability Enhancing the probability of identical faults in original and redundant rounds Two major aspects The size of the fault space The probability distribution of faults in the fault space A smaller fault space enhances the fault collision probability A non-uniform probability distribution of faults in the fault space also enhances the fault collision probability COSADE 2015 7
Biased Fault Model A Hypothetical Fault Model Different faults have unequal probability of occurrence Variance = 0 Biasness of the fault model can be quantified by the variance of fault probability distribution Variance = 0.004 Higher the variance, higher is the degree of bias of the fault model Variance = 0.026 COSADE 2015 8
The Fault Collision Probability With increase in variance, the fault collision probability increases Requires fewer number of fault injections per useful ciphertext COSADE 2015 9
Long Story Short But what about practical feasibility? The Adversarial Perspective Yes!! It is practically feasible COSADE 2015 10
Proposed Fault Model Fault Classification Suitable All faults are restricted to a single byte Two kinds of fault models Situation-1: Attacker has control over target byte Fault Precision Situation-2: Attacker has no control over target byte Control over target byte makes fault model more precise but is costly to achieve COSADE 2015 11
Fault Injection Set-Up Time redundant AES-128 implemented in Spartan 3A FPGA Fault injection using clock glitches at various frequencies Xilinx DCM to drive fast clock frequency Internal state monitoring using ChipScope Pro 12.3 COSADE 2015 12
Fault Injection Technique 13 COSADE 2015
Time Redundant AES-128 AES-128 Encryption Module COSADE 2015 14
Fault Distribution Patterns Distribution pattern checked over 512 random fault injections Frequency Ranges Number of Fault Instances Frequency (in MHz) COSADE 2015 15
Attack Procedure Notations COSADE 2015 16
Attack Procedure Fault Injection Useful Ciphertext obtained if fi = fj COSADE 2015 17
Attack Procedure Requires Only Faulty Ciphertexts Distinguishers used : Differential Fault Intensity Analysis, Ghalaty et. al., FDTC 2014 Hamming Distance (HD) Squared Euclidean Imbalance (SEI) Make a key hypothesis k and evaluate the distinguishers Fault Attacks on AES with Faulty Ciphertexts Only, Fuhr et. al., FDTC 2013 Correct hypothesis gives minimum and maximum values respectively SEI 18 COSADE 2015
Attack Procedure Target Rounds Round 9 (Rounds 17 and 18 of time redundant AES) Fault is injected before the SubBytes operation of round 9 Hypothesize on one byte ofK10 at a time Round 8 (Rounds 15 and 16 of time redundant AES) Fault is injected before the SubBytes operation of round 8 Hypothesize on 4 bytes ofK10 and one byte of K9 at a time Beyond Round 8 attacks on time redundant AES become infeasible as very large number of fault injections are required COSADE 2015 19
Number of ciphertexts required to guess a key byte with 99% accuracy Simulation : Part-1 Simulation results Identical faults introduced into both original and redundant rounds Target byte chosen at random Same fault for original and redundant computations Each fault injection yields a useful ciphertext Attacks simulated on rounds 8 and 9 Performed separately for each fault model COSADE 2015 20
Perfect control over target byte Simulation : Part-2 Vary the degree of bias in the fault model Control the variance of the fault probability distribution Observe the number of fault injections per useful ciphertext No control over target byte Two adversarial models: Perfect control over target byte Larger number of fault injections No control over target byte COSADE 2015 21
Practical Experiments Fixing the Target Byte Proposed attack evaluated on a time redundant hardware implementation of AES-128 on Spartan 3A FPGA RTL Verilog definition of time redundant AES A total of 20 rounds with comparison after each even round Two types of implementations: Type 1 : Target byte is fixed Type 2 : Target byte is random COSADE 2015 22
Experimental Results Total Fault Injections Useful ciphertexts Results presented per byte of key COSADE 2015 23
Conclusions Biased fault models weaken the time redundancy countermeasure considerably Our experiments demonstrate practically feasible attacks on actual implementations of time redundant AES-128 Countermeasures based on uniform fault patterns must therefore be revisited in the light of biased fault models COSADE 2015 24
Thank You! COSADE 2015 25