Paper 2021/1362

Practical Multiple Persistent Faults Analysis

Hadi Soleimany, Nasour Bagheri, Hosein Hadipour, Prasanna Ravi, Shivam Bhasin, and Sara Mansouri

Abstract

We focus on the multiple persistent faults analysis in this paper to fill existing gaps in its application in a variety of scenarios. Our major contributions are twofold. First, we propose a novel technique to apply persistent fault in the multiple persistent faults setting that decreases the number of survived keys and the required data. We demonstrate that by utilizing 1509 and 1448 ciphertexts, the number of survived keys after performing persistent fault analysis on AES in the presence of eight and sixteen faults can be reduced to only $2^9$ candidates, whereas the best known attacks need 2008 and 1643 ciphertexts, respectively, with a time complexity of $2^{50}$. Second, we develop generalized frameworks for retrieving the key in the ciphertext-only model. Our methods for both performing persistent fault attacks and key-recovery processes are highly flexible and provide a general trade-off between the number of required ciphertexts and the time complexity. To break AES with 16 persistent faults in the Sbox, our experiments show that the number of required ciphertexts can be decreased to 477 while the attack is still practical with respect to the time complexity. To confirm the accuracy of our methods, we performed several simulations as well as experimental validations on the ARM Cortex-M4 microcontroller with electromagnetic fault injection on AES and LED, which are two well-known block ciphers to validate the types of faults and the distribution of the number of faults in practice.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published by the IACR in TCHES 2022
Keywords
Fault AttackPersistent Fault AnalysisMultiple FaultsAES
Contact author(s)
hadi soleimany @ gmail com
Na Bagheri @ gmail com
prasanna ravi @ ntu edu sg
sbhasin @ ntu edu sg
History
2021-10-13: last of 2 revisions
2021-10-12: received
See all versions
Short URL
https://ia.cr/2021/1362
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2021/1362,
      author = {Hadi Soleimany and Nasour Bagheri and Hosein Hadipour and Prasanna Ravi and Shivam Bhasin and Sara Mansouri},
      title = {Practical Multiple Persistent Faults Analysis},
      howpublished = {Cryptology ePrint Archive, Paper 2021/1362},
      year = {2021},
      note = {\url{https://eprint.iacr.org/2021/1362}},
      url = {https://eprint.iacr.org/2021/1362}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.