Paper 2018/072
Template-based Fault Injection Analysis of Block Ciphers
Ashrujit Ghoshal, Sikhar Patranabis, and Debdeep Mukhopadhyay
Abstract
We present the first template-based fault injection analysis of FPGA-based block cipher implementations. While template attacks have been a popular form of side-channel analysis in the cryptographic literature, the use of templates in the context of fault attacks has not yet been explored to the best of our knowledge. Our approach involves two phases. The first phase is a profiling phase where we build templates of the fault behavior of a cryptographic device for different secret key segments under different fault injection intensities. This is followed by a matching phase where we match the observed fault behavior of an identical but black-box device with the pre-built templates to retrieve the secret key. We present a generic treatment of our template-based fault attack approach for SPN block ciphers, and illustrate the same with case studies on a Xilinx Spartan-6 FPGA-based implementation of AES-128.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Published elsewhere. 8th International Conference on Security, Privacy, and Applied Cryptography Engineering(SPACE 2018)
- Keywords
- Template AttacksFault InjectionFault Intensity
- Contact author(s)
- ashrujit ck @ gmail com
- History
- 2018-10-18: revised
- 2018-01-18: received
- See all versions
- Short URL
- https://ia.cr/2018/072
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2018/072, author = {Ashrujit Ghoshal and Sikhar Patranabis and Debdeep Mukhopadhyay}, title = {Template-based Fault Injection Analysis of Block Ciphers}, howpublished = {Cryptology {ePrint} Archive, Paper 2018/072}, year = {2018}, url = {https://eprint.iacr.org/2018/072} }