Abstract
Physical attacks are a serious threat to the Internet of Things devices. Differential power analysis attacks are the most well-known physical attacks that exploit physical information leaked from hardware devices to retrieve secret information. Fault analysis attacks, a type of physical attack, are often considered more powerful than side-channel attacks if an attacker can inject the attacker’s intended faults. In fact, a few times of fault injections have enabled the attacker to retrieve the secret key. In this study, we propose a new model to validate the resistance of block ciphers to Differential Fault Analysis (DFA) attacks by assuming an ideal block cipher in which the differential probability is the same for all input and output differences. We show that Advanced Encryption Standard (AES) is near ideal for DFA attack resistance according to the experimental results.
This work was supported by JSPS KAKENHI Grant Number JP18H05289.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_25
Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513–525. Springer, Heidelberg (1997). https://doi.org/10.1007/BFb0052259
National Institute of Standards and Technology. FIPS 197: Announcing the Advanced Ciphers Standard (AES). http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf
Handschuh, H., Paillier, P., Stern, J.: Probing attacks on tamper-resistant devices. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 303–315. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48059-5_26
Schmidt, J.-M., Kim, C.H.: A probing attack on AES. In: Chung, K.-I., Sohn, K., Yung, M. (eds.) WISA 2008. LNCS, vol. 5379, pp. 256–265. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00306-6_19
Sakiyama, K., Li, Y., Iwamoto, M., Ohta, K.: Information-theoretic approach to optimal differential fault analysis. IEEE Trans. Inf. Forensic Secur. 7(1), 109–120 (2012)
Shoji, N., Sugawara, T., Iwamoto, M., Sakiyama, K.: An abstraction model for 1-bit probing attack on block ciphers. In: Proceedings of the International Conference on Computer and Communication Systems (ICCCS 2019), pp. 502–506. IEEE (2019)
Piret, G., Quisquater, J.-J.: A differential fault attack technique against SPN structures, with application to the AES and Khazad. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 77–88. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45238-6_7
Moradi, A., Shalmani, M.T.M., Salmasizadeh, M.: A generalized method of differential fault attack against AES cryptosystem. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 91–100. Springer, Heidelberg (2006). https://doi.org/10.1007/11894063_8
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Sugimoto, H., Hatano, R., Shoji, N., Sakiyama, K. (2020). Validating the DFA Attack Resistance of AES (Short Paper). In: Benzekri, A., Barbeau, M., Gong, G., Laborde, R., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2019. Lecture Notes in Computer Science(), vol 12056. Springer, Cham. https://doi.org/10.1007/978-3-030-45371-8_25
Download citation
DOI: https://doi.org/10.1007/978-3-030-45371-8_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-45370-1
Online ISBN: 978-3-030-45371-8
eBook Packages: Computer ScienceComputer Science (R0)