Paper 2018/072

Template-based Fault Injection Analysis of Block Ciphers

Ashrujit Ghoshal, Sikhar Patranabis, and Debdeep Mukhopadhyay

Abstract

We present the first template-based fault injection analysis of FPGA-based block cipher implementations. While template attacks have been a popular form of side-channel analysis in the cryptographic literature, the use of templates in the context of fault attacks has not yet been explored to the best of our knowledge. Our approach involves two phases. The first phase is a profiling phase where we build templates of the fault behavior of a cryptographic device for different secret key segments under different fault injection intensities. This is followed by a matching phase where we match the observed fault behavior of an identical but black-box device with the pre-built templates to retrieve the secret key. We present a generic treatment of our template-based fault attack approach for SPN block ciphers, and illustrate the same with case studies on a Xilinx Spartan-6 FPGA-based implementation of AES-128.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. 8th International Conference on Security, Privacy, and Applied Cryptography Engineering(SPACE 2018)
Keywords
Template AttacksFault InjectionFault Intensity
Contact author(s)
ashrujit ck @ gmail com
History
2018-10-18: revised
2018-01-18: received
See all versions
Short URL
https://ia.cr/2018/072
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2018/072,
      author = {Ashrujit Ghoshal and Sikhar Patranabis and Debdeep Mukhopadhyay},
      title = {Template-based Fault Injection Analysis of Block Ciphers},
      howpublished = {Cryptology ePrint Archive, Paper 2018/072},
      year = {2018},
      note = {\url{https://eprint.iacr.org/2018/072}},
      url = {https://eprint.iacr.org/2018/072}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.