Skip to main content

Differential Fault Based Key Recovery Attacks on TRIAD

  • Conference paper
  • First Online:
Information Security and Cryptology – ICISC 2020 (ICISC 2020)

Abstract

We demonstrate two fault based key recovery attacks – a bit-flipping fault attack, and a random fault attack, on the authenticated encryption stream cipher TRIAD. The attacks discussed in this paper are applicable mainly due to the simplicity of the TRIAD keystream function during the first few hundred rounds. We investigated the algebraic normal form (ANF) of the first 160 output keystream bits of TRIAD. The ANF of these output keystream bits shows specific patterns that are used in our fault attacks. We first use these patterns with a bit-flipping fault model combined with solving a system of low degree algebraic equations that requires 85 faults to recover the secret key of TRIAD, with a data complexity of \(2^{7.43}\). We then relax our assumptions by using a random fault model. The random fault model described in this paper is also combined with solving a system of low degree algebraic equations and requires on average 170 faults to recover the secret key of TRIAD with a data complexity of \(2^{8.01}\). For both of the attacks, the complexity of solving the low degree algebraic equations is negligible. We have not performed experiments on the actual hardware implementation, but we have verified all the attacks using simulation on TRIAD software implementation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. NIST Lightweight Cryptography Project (2019). https://csrc.nist.gov/projects/lightweight-cryptography

  2. Banik, S., Isobe, T., Meier, W., Todo, Y., Zhang, B.: TRIAD v1 - A Lightweight AEAD and Hash Function based on Stream Cipher, NIST Lightweight Cryptography (LWC) Project (2019). https://csrc.nist.gov/CSRC/media/Projects/Lightweight-Cryptography/documents/round-1/spec-doc/TRIAD-spec.pdf

  3. De Cannière, C., Preneel, B.: Trivium: A stream cipher construction inspired by block cipher design principles. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) Information Security - ISC 2006, LNCS, vol. 4176, pp. 171–186. Springer, Heidelberg (2006). https://doi.org/10.1007/11836810_13

  4. eSTREAM: the ECRYPT Stream Cipher Project. https://www.ecrypt.eu.org/stream/. Accessed 11 Sep 2020

  5. He, Y., Wang, G., Li, W., Ren, Y.: Improved cube attacks on some authenticated encryption ciphers and stream ciphers in the Internet of Things. IEEE Access 8, 20920–20930 (2020). https://doi.org/10.1109/ACCESS.2020.2967070

    Article  Google Scholar 

  6. Kesarwani, A., Sarkar, S., Venkateswarlu, A.: Some cryptanalytic results on TRIAD. In: Hao, F., Ruj, S., Sen Gupta, S. (eds.) Progress in Cryptology - INDOCRYPT 2019, LNCS, vol. 11898, pp. 160–174. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-35423-7_8

  7. Schmidt, J., Herbst, C.: A practical fault attack on square and multiply. In: 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 53–58. IEEE, Washington, DC (2008). https://doi.org/10.1109/FDTC.2008.10

  8. Hutter, M., Schmidt, J.: The temperature side channel and heating fault attacks. In: Francillon, A., Rohatgi, P. (eds.) Smart Card Research and Advanced Applications - CARDIS 2013, LNCS, vol. 8419, pp. 219–235. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-08302-5_15

  9. Amiel, F., Clavier, C., Tunstall, M.: Fault analysis of DPA-resistant algorithms. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, JP. (eds.) Fault Diagnosis and Tolerance in Cryptography - FDTC 2006, LNCS, vol. 4236, pp. 223–236. Springer, Heidelberg (2006). https://doi.org/10.1007/11889700_20

  10. Barenghi, A., Breveglieri, L., Koren, I., Naccache, D.: Fault injection attacks on cryptographic devices: theory, practice, and countermeasures. Proc. IEEE 100(11), 3056–3076 (2012). https://doi.org/10.1109/JPROC.2012.2188769

    Article  Google Scholar 

  11. Skorobogatov, S.P., Anderson, R.J.: Optical fault induction attacks. In: Kaliski, B.S., Koç, K., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2002, LNCS, vol. 2523, pp. 2–12, Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36400-5_2

  12. Selmke, B., Heyszl, J., Sigl, G.: Attack on a DFA protected AES by simultaneous laser fault injections. In: 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 36–46. IEEE, Santa Barbara (2016). https://doi.org/10.1109/FDTC.2016.16

  13. Trichina, E., Korkikyan, R.: Multi fault laser attacks on protected CRT-RSA. In: 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 75–86. IEEE, Santa Barbara (2010). https://doi.org/10.1109/FDTC.2010.14

  14. Dey, P., Rohit, R.S., Sarkar, S., Adhikari, A.: Differential fault analysis on Tiaoxin and AEGIS family of ciphers. In: Mueller, P., Thampi, S., Alam, B.M., Ko R., Doss, R., Alcaraz, C.J. (eds.) Security in Computing and Communications - SSCC 2016, CCIS, vol. 625, pp. 74–86, Springer, Singapore (2016). https://doi.org/10.1007/978-981-10-2738-3_7

  15. Salam, I., Mahri, H.A., Simpson, L., Bartlett, H., Dawson, E., Wong, K.K.: Fault attacks on Tiaoxin-346. In: Proceedings of the the Australasian Computer Science Week - ASCW 2018, pp. 1–9. ACM Digital Library, New York (2018). https://doi.org/10.1145/3167918.3167940

  16. Bartlett, H., Dawson, E., Mahri, H.A., Salam, M.I., Simpson, L., Wong, K.K-H.: Random fault attacks on a class of stream ciphers, security and communication networks, vol. 2019, Article ID 1680263, 12 pages (2019). https://doi.org/10.1155/2019/1680263

  17. The Sage Developers. SageMath, The Sage Mathematics Software System (Version 9.0) (2020). https://www.sagemath.org

  18. Buchberger, B.: Gröbner-bases: an algorithmic method in polynomial ideal theory. In: Bose, N.K. (ed.) Multidimensional Systems Theory, pp. 184–232. Reidel Publishing Company, Dodrecht (1985)

    Chapter  Google Scholar 

Download references

Acknowledgements

This research is supported by Xiamen University Malaysia Research Fund (Grant No: XMUMRF/2019-C3/IECE/0005).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Iftekhar Salam .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Salam, I., Law, K.Y., Xue, L., Yau, WC. (2021). Differential Fault Based Key Recovery Attacks on TRIAD. In: Hong, D. (eds) Information Security and Cryptology – ICISC 2020. ICISC 2020. Lecture Notes in Computer Science(), vol 12593. Springer, Cham. https://doi.org/10.1007/978-3-030-68890-5_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-68890-5_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-68889-9

  • Online ISBN: 978-3-030-68890-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics