Paper 2022/860

AB-SIFA: SIFA with Adjacent-Byte Model

Chunya Hu
Yongbo Hu
Wenfeng Zhu
Zixin Tan
Qi Zhang
Zichao Gong
Yanhao Gong
Luyao Jin
Pengwei Feng
Abstract

Statistical Ineffective Fault Attack (SIFA) has been a threat for implementa-tions of symmetric cryptographic primitives. Unlike Differential Fault At-tacks (DFA) which takes both correct and faulty ciphertexts, SIFA can re-cover the secret key with only correct ciphertexts. The classic SIFA is only effective on fault models with non-uniform distribution of intermediate val-ue. In this paper, we present a new fault model named adjacent-byte model, which describes a non-uniform distribution of relationship between two bytes (i.e. exclusive-or). To the best of our knowledge, it is the first time that this fault model has been proposed. We also show that the adjacent-byte faults can be induced by different fault sources and easy to reproduce. Then a new SIFA attack method called AB-SIFA on symmetric cryptography is proposed. We demonstrate the effectiveness of this new attack by simulating the attack. Finally, our attacks are applied to a software implementations of AES-128 with redundant countermeasure and a hardware AES co-processor, utilizing voltage glitches and clock glitches.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
Fault Attack Fault Model Statistical Ineffective Fault Attack AES
Contact author(s)
hcy_0323 @ 163 com
huyongbo @ goodix com
zhuwenfeng @ goodix com
tanzixin @ goodix com
zhangqi @ goodix com
gongzichao @ goodix com
gongyanhao @ goodix com
jinluyao @ goodix com
fengpengwei @ goodix com
History
2022-07-01: approved
2022-07-01: received
See all versions
Short URL
https://ia.cr/2022/860
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2022/860,
      author = {Chunya Hu and Yongbo Hu and Wenfeng Zhu and Zixin Tan and Qi Zhang and Zichao Gong and Yanhao Gong and Luyao Jin and Pengwei Feng},
      title = {AB-SIFA: SIFA with Adjacent-Byte Model},
      howpublished = {Cryptology ePrint Archive, Paper 2022/860},
      year = {2022},
      note = {\url{https://eprint.iacr.org/2022/860}},
      url = {https://eprint.iacr.org/2022/860}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.