Paper 2022/1468
Vulnerability Assessment of Ciphers To Fault Attacks Using Reinforcement Learning
Abstract
A fault attack (FA) is one of the most potent threats to cryptographic applications. Implementing a FA-protected block cipher requires knowledge of the exploitable fault space of the underlying crypto algorithm. The discovery of exploitable faults is a challenging problem that demands human expertise and time. Current practice is to rely on certain predefined fault models. However, the applicability of such fault models varies among ciphers. Prior work discovers such exploitable fault models individually for each cipher at the expanse of a large amount of human effort. Our work completely replaces human effort by using reinforcement learning (RL) over the huge fault space of a block cipher to discover the effective fault models automatically. Validation on an AES block cipher demonstrates that our approach can automatically discover the effective fault models within a few hours, outperforming prior work, which requires days of manual analysis. The proposed approach also reveals vulnerabilities in the existing FA-protected block ciphers and initiates an end-to-end vulnerability assessment flow.
Metadata
- Available format(s)
- Category
- Applications
- Publication info
- Preprint.
- Keywords
- Reinforcement Learning Fault Attack Block Cipher AES
- Contact author(s)
-
guohao2019 @ tamu edu
sayandeep iitkgp @ gmail com
satwik patnaik @ tamu edu
gohil vasudev @ tamu edu
Debdeep mukhopadhyay @ gmail com
jv rajendran @ tamu edu - History
- 2022-10-27: approved
- 2022-10-26: received
- See all versions
- Short URL
- https://ia.cr/2022/1468
- License
-
CC BY-SA
BibTeX
@misc{cryptoeprint:2022/1468, author = {Hao Guo and Sayandeep Saha and Satwik Patnaik and Vasudev Gohil and Debdeep Mukhopadhyay and Jeyavijayan (JV) Rajendran}, title = {Vulnerability Assessment of Ciphers To Fault Attacks Using Reinforcement Learning}, howpublished = {Cryptology {ePrint} Archive, Paper 2022/1468}, year = {2022}, url = {https://eprint.iacr.org/2022/1468} }