Paper 2022/865

Linked Fault Analysis

Ali Asghar Beigizad, Cyber Research Center, Shahid Beheshti University, Tehran, Iran
Hadi Soleimany, Cyber Research Center, Shahid Beheshti University, Tehran, Iran
Sara Zarei, Cyber Research Center, Shahid Beheshti University, Tehran, Iran
Hamed Ramzanipour, Shahid Rajaee Teacher Training University
Abstract

Numerous fault models have been developed, each with distinct characteristics and effects. These models should be evaluated in light of their costs, repeatability, and practicability. Moreover, there must be effective ways to use the injected fault to retrieve the secret key, especially if there are some countermeasures in the implementation. In this paper, we introduce a new fault analysis technique called ``linked fault analysis'' (LFA), which can be viewed as a more powerful version of well-known fault attacks against implementations of symmetric primitives in various circumstances, especially software implementations. For known fault analyses, the bias over the faulty value or the relationship between the correct value and the faulty one, both produced by the fault injection serve as the foundations for the fault model. In the LFA, however, a single fault involves two intermediate values. The faulty target variable, $u'$, is linked to a second variable, $v$, such that a particular relation holds: $u'=l(v)$. We show that LFA lets the attacker perform fault attacks without the input control, with much fewer data than previously introduced fault attacks in the same class. Also, we show two approaches, called LDFA and LIFA, that show how LFA can be utilized in the presence or absence of typical redundant-based countermeasures. Finally, we demonstrate that LFA is still effective, but under specific circumstances, even when masking protections are in place. We performed our attacks against the public implementation of AES in ATMEGA328p to show how LFA works in the real world. The practical results and simulations validate our theoretical models as well.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Published elsewhere. IEEE Transactions on Information Forensics and Security
DOI
10.1109/TIFS.2023.3327658
Keywords
Fault AnalysisLinked Fault
Contact author(s)
beigizad @ yahoo com
hadi soleimany @ gmail com
sarazareei 94 @ gmail com
hamedramzanipour97 @ gmail com
History
2023-11-14: last of 3 revisions
2022-07-01: received
See all versions
Short URL
https://ia.cr/2022/865
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2022/865,
      author = {Ali Asghar Beigizad and Hadi Soleimany and Sara Zarei and Hamed Ramzanipour},
      title = {Linked Fault Analysis},
      howpublished = {Cryptology ePrint Archive, Paper 2022/865},
      year = {2022},
      doi = {10.1109/TIFS.2023.3327658},
      note = {\url{https://eprint.iacr.org/2022/865}},
      url = {https://eprint.iacr.org/2022/865}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.