Abstract
Consider the problem of estimating the success rate of an attacker for a given fault location. Intuitively, the success rate indicates the likeliness of an attack for returning the key bits within a practical computational bound. It is a quantity worth estimating as it helps in choosing cipher constructs and sub-operations showing a certain amount of robustness against fault attacks. In this chapter, we present a framework, which can estimate quantities like success rate and can provide new insights into the cipher structures in the context of fault attacks. The main idea is to utilize the exact encoding of algebraic fault attacks (AFA) for exploring the fault space without getting affected by its prohibitive time complexity. We propose a machine learning (ML) based speedup strategy to make the AFA suitable for characterizing huge fault spaces statistically. This statistical approach is found to be extremely informative for cipher designers and evaluators.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
A block cipher is nothing but a Boolean function, and for every Boolean function, we can have such an algebraic representation. In fact, this representation is a normal form known as algebraic normal form (ANF).
- 2.
In this chapter, we shall present a quantification of the fault space size. It is worth mentioning that ExpFault handles the fault space by means of abstraction, which makes the fault space exploration problem rather scalable.
- 3.
The fault values and the plaintext values are not explicitly considered (i.e., abstracted) in ExpFault. The fault space size becomes relatively reasonable to be exhausted without these two parameters. The flip side of this abstraction is that ExpFault returns the best case attack complexity (from attacker’s perspective) for certain ciphers like PRESENT.
- 4.
However, it is worth mentioning that, by assigning some of the correct key bits in the equation system, a cipher evaluator can also handle the cases where key extraction by means of a fault is partial.
References
N. Bagheri, R. Ebrahimpour, N. Ghaedi, New differential fault analysis on present. EURASIP J. Adv. Signal Process. 2013(1), 145 (2013)
C. Beierle, J. Jean, S. Kölbl, G. Leander, A. Moradi, T. Peyrin, Y. Sasaki, P. Sasdrich, S.M. Sim, The SKINNY family of block ciphers and its low-latency variant MANTIS, in Annual Cryptology Conference (Springer, Berlin, 2016), pp. 123–153
E. Biham, R. Anderson, L. Knudsen, Serpent: a new block cipher proposal, in Proc. 5th Int. Workshop Fast Software Encryption (FSE) (Springer, Paris, 1998), pp. 222–238
A. Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J. Robshaw, Y. Seurin, C. Vikkelsoe, PRESENT: an ultra-lightweight block cipher, in Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ’07 (Springer, Berlin, 2007) pp. 450–466
L. Breiman, Random forests. Mach. Learn. 45(1), 5–32 (2001)
N.T. Courtois, K. Jackson, D. War, Fault-algebraic attacks on inner rounds of des, in e-Smart’10 Proceedings: The Future of Digital Security Technologies (Strategies Telecom and Multimedia, Montreuil, 2010)
F. De Santis, O.M. Guillen, E. Sakic, G. Sigl, Ciphertext-only fault attacks on present, in International Workshop on Lightweight Cryptography for Security and Privacy (Springer, Cham, 2014), pp. 85–108
J.-C. Faugere, A. Joux, Algebraic cryptanalysis of hidden field equation (HFE) cryptosystems using Gröbner bases, in Proc. 23rd Annual Cryptology Conference (CRYPTO), vol. 2729 (Springer, Santa Barbara, 2003), pp. 44–60
N.F. Ghalaty, B. Yuce, P. Schaumont, Differential fault intensity analysis on present and led block ciphers, in International Workshop on Constructive Side-Channel Analysis and Secure Design (Springer, Cham, 2015), pp. 174–188
J. Guo, T. Peyrin, A. Poschmann, M. Robshaw, The LED block cipher, in Cryptographic Hardware and Embedded Systems—CHES 2011 (Springer, Berlin, 2011), pp. 326–341
E. Hsu, C. Muise, J. Beck, S. McIlraith, Probabilistically estimating backbones and variable bias: experimental overview, in Proc. 14th Int. Conf. Principles Practice Constraint Programming (CP) (Springer, Sydney, 2008), pp. 613–617
F. Hutter, Y. Hamadi, H.H. Hoos, K. Leyton-Brown, Performance prediction and automated tuning of randomized and parametric algorithms, in Proc. 12th Int. Conf. Principles Practice Constraint Programming (CP), (Springer, Nantes, 2006), pp. 213–228
F. Hutter, L. Xu, H.H. Hoos, K. Leyton-Brown, Algorithm runtime prediction: methods & evaluation. Artif. Intell. 206, 79–111 (2014)
P. Jovanovic, M. Kreuzer, I. Polian, An algebraic fault attack on the led block cipher. IACR Cryptology ePrint Archive 2012, 400 (2012)
P. Jovanovic, M. Kreuzer, I. Polian, A fault attack on the LED block cipher, in Proc. 3rd Int. Workshop Constructive Side-Channel Analysis Secure Design (COSADE), (Springer, Darmstadt, 2012), pp. 120–134
P. Khanna, C. Rebeiro, A. Hazra, XFC: a framework for eXploitable fault characterization in block ciphers, in Proceedings of the 54th Annual Design Automation Conference 2017, DAC ’17 (ACM, New York, 2017), pp. 8:1–8:6
K. Leyton-Brown, E. Nudelman, Y. Shoham, Empirical hardness models: methodology and a case study on combinatorial auctions. J. ACM 56(4), 22 (2009)
W. Li, D. Gu, X. Xia, C. Zhao, Z. Liu, Y. Liu, Q. Wang, Single byte differential fault analysis on the LED lightweight cipher in the wireless sensor network. Int. J. Comput. Intell. Syst. 5(5), 896–904 (2012)
W. Li, W. Zhang, D. Gu, Y. Cao, Z. Tao, Z. Zhou, Y. Liu, Z. Liu, Impossible differential fault analysis on the LED lightweight cryptosystem in the vehicular ad-hoc networks. IEEE Trans. Dependable Sec. Comput. 13(1), 84–92 (2016)
L. Lobjois, M. Lemaître, Branch and bound algorithm selection by performance prediction, in Proc. 15th National Conf. AI, 10th Innovative Applications AI Conf. (AAAI/IAAI) (AAAI, Wisconsin, 1998), pp. 353–358
P. Luo, K. Athanasiou, Y. Fei, T. Wahl, Algebraic fault analysis of sha-3, in Proc. 20th Design, Automation & Test in Europe Conference & Exhibition (DATE) (IEEE, Lausanne, Mar 2017), pp. 151–156
D. Mitchell, B. Selman, H. Levesque, Hard and easy distributions of SAT problems, in Proc. 10th National Conf. AI (AAAI), vol. 92 (AAAI, San Jose, 1992), pp. 459–465
E. Nudelman, K. Leyton-Brown, H.H. Hoos, A. Devkar, Y. Shoham, Understanding random SAT: beyond the clauses-to-variables ratio, in Proc. 10th Int. Conf. Principles Practice Constraint Programming (CP) (Springer, Toronto, 2004), pp. 438–452
S. Saha, D. Jap, S. Patranabis, D. Mukhopadhyay, S. Bhasin, P. Dasgupta, Automatic characterization of exploitable faults: a machine learning approach. IEEE Trans. Inf. Forensics Secur. 14(4), 954–968 (2019)
M. Soos, K. Nohl, C. Castelluccia, Extending SAT solvers to cryptographic problems, in Proc. 12th Int. Conf. Theory Applications Satisfiability Testing (SAT) (Springer, Wales, 2009), pp. 244–257
K.R. Varshney, A risk bound for ensemble classification with a reject option, in Proc. 14th IEEE Workshop Statistical Signal Process. (SSP) (IEEE, Nice, June 2011), pp. 769–772
G. Wang, S. Wang, Differential fault analysis on PRESENT key schedule, in 2010 International Conference on Computational Intelligence and Security (CIS) (IEEE, Nanning, 2010), pp. 362–366
L. Xu, F. Hutter, H.H. Hoos, K. Leyton-Brown, SATzilla: portfolio-based algorithm selection for SAT. J. Artif. Intell. Res. 32, 565–606 (2008)
F. Zhang, X. Zhao, S. Guo, T. Wang, Z. Shi. Improved algebraic fault analysis: a case study on piccolo and applications to other lightweight block ciphers, in Proc. 4th Int. Workshop Constructive Side-Channel Analysis Secure Design (COSADE) (Springer, Paris, 2013), pp. 62–79
F. Zhang, S. Guo, X. Zhao, T. Wang, J. Yang, F.-X. Standaert, D. Gu. A framework for the analysis and evaluation of algebraic fault attacks on lightweight block ciphers. IEEE Trans. Inf. Forensics Secur. 11(5), 1039–1054 (2016)
X. Zhao, S. Guo, T. Wang, F. Zhang, Z. Shi. Fault-propagate pattern based DFA on PRESENT and PRINT cipher. Wuhan Univ. J. Nat. Sci. 17(6), 485–493 (2012)
X. Zhao, S. Guo, F. Zhang, Z. Shi, C. Ma, T. Wang, Improving and evaluating differential fault analysis on LED with algebraic techniques, in Proc. 10th IEEE Workshop Fault Diagnosis Tolerance Cryptogr. (FDTC) (IEEE, Santa Barbara, 2013), pp. 41–51
G. Zhao, R. Li, L. Cheng, C. Li, B. Sun, Differential fault analysis on LED using Super-Sbox. IET Inform. Secur. 9(4), 209–218 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Saha, S., Jap, D., Patranabis, S., Mukhopadhyay, D., Bhasin, S., Dasgupta, P. (2019). Exploitable Fault Space Characterization: A Complementary Approach. In: Breier, J., Hou, X., Bhasin, S. (eds) Automated Methods in Cryptographic Fault Analysis. Springer, Cham. https://doi.org/10.1007/978-3-030-11333-9_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-11333-9_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-11332-2
Online ISBN: 978-3-030-11333-9
eBook Packages: EngineeringEngineering (R0)