Abstract
Electromagnetic fault injection (EMFI) is a deliberate technique used to induce faults in a device by exposing it to electromagnetic interference. ASCON is a lightweight cipher that offers better performance than other ciphers, making it suitable for IoT devices with limited resources. However, the use of lightweight ciphers on hardware devices can pose a significant security risk against EMFI attacks, which can manipulate both the device’s behavior and the implemented encryption algorithms. Our research used the ChipShouter, a specialized tool designed specifically for EMFI attacks on electronic devices. During these attacks, we intentionally exposed the M5STACK ESP32 Timer Camera (OV3660) module, on which we implement the ASCON algorithm, to electromagnetic pulses emitted by the ChipShouter. These pulses were directed at the PSRAM of the target device, where essential values such as plaintext, associated data, nonce, key, etc., are stored. Through the introduction of these pulses, we successfully inject faults and demonstrate the vulnerability of ASCON to EMFI attacks. To evaluate the impact, We test with different string sizes for input plaintext, namely 250 Kb, 500 Kb, and 1 MB. The results revealed that the fault injection percentages were as follows: 24% for the 250 Kb string size, 54% for the 500 Kb size, and 90% for the 1 MB size.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ordas, S., Guillaume-Sage, L., Maurine, P.: EM injection: fault model and locality. In: 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE (2015)
Dehbaoui, A., et al.: Electromagnetic transient faults injection on a hardware and a software implementations of AES. In: 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography. IEEE (2012)
Majéric, F., Bourbao, E., Bossuet, L.: Electromagnetic security tests for SoC. In: 2016 IEEE International Conference on Electronics, Circuits and Systems (ICECS). IEEE (2016)
Moro, N., et al.: Electromagnetic fault injection: towards a fault model on a 32-bit microcontroller. In: 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography. IEEE (2013)
Beckers, A., et al.: (Adversarial) electromagnetic disturbance in the industry. IEEE Trans. Comput. 72, 414–422 (2022)
Schellenberg, F., et al.: On the complexity reduction of laser fault injection campaigns using OBIC measurements. In: 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE (2015)
O’Flynn, C.: MIN () imum failure: EMFI attacks against USB stacks. In: WOOT@ USENIX Security Symposium (2019)
Pilla, R., Jain, K.: A new authentication protocol for hardware-based authentication systems in an IoT environment. In: Smys, S., Kamel, K.A., Palanisamy, R. (eds.) Inventive Computation and Information Technologies. Lecture Notes in Networks and Systems, vol. 563, pp. 629–640. Springer, Singapore (2023). https://doi.org/10.1007/978-981-19-7402-1_44
Saran, D.V.G., Jain, K.: An improvised algorithm for a dynamic key generation model. In: Smys, S., Kamel, K.A., Palanisamy, R. (eds.) Inventive Computation and Information Technologies. Lecture Notes in Networks and Systems, vol. 563, pp. 607–627. Springer, Singapore (2023). https://doi.org/10.1007/978-981-19-7402-1_43
Beckers, A., et al.: Characterization of EM faults on atmega328p. In: 2019 Joint International Symposium on Electromagnetic Compatibility, Sapporo and Asia-Pacific International Symposium on Electromagnetic Compatibility (EMC Sapporo/APEMC). IEEE (2019)
Proy, J., et al.: Studying EM pulse effects on superscalar microarchitectures at ISA level. arXiv preprint: arXiv:1903.02623 (2019)
Trouchkine, T., et al.: Electromagnetic fault injection against a system-on-chip, toward new micro-architectural fault models. arXiv preprint: arXiv:1910.11566 (2019)
Surya, G., Maistri, P., Sankaran, S.: Local clock glitching fault injection with application to the ASCON cipher. In: 2020 IEEE International Symposium on Smart Electronic Systems (iSES)(Formerly iNiS). IEEE (2020)
Gravellier, J., Dutertre, J.-M., Teglia, Y., Moundi, P.L., Olivier, F.: Remote side-channel attacks on heterogeneous SoC. In: Belaïd, S., Güneysu, T. (eds.) CARDIS 2019. LNCS, vol. 11833, pp. 109–125. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-42068-0_7
Dobraunig, C., et al.: ASCON v1. 2. Submiss. CAESAR Competit. 5(6), 7 (2016)
Skorobogatov, S.P., Anderson, R.J.: Optical fault induction attacks. In: Kaliski, B.S., Koç, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 2–12. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36400-5_2
Ordas, S., Guillaume-Sage, L., Maurine, P.: Electromagnetic fault injection: the curse of flip-flops. J. Cryptogr. Eng. 7, 183–197 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 IFIP International Federation for Information Processing
About this paper
Cite this paper
Narayanan, V., Sankaran, S. (2024). Electromagnetic Fault Injection Attack on ASCON Using ChipShouter. In: Puthal, D., Mohanty, S., Choi, BY. (eds) Internet of Things. Advances in Information and Communication Technology. IFIPIoT 2023. IFIP Advances in Information and Communication Technology, vol 683. Springer, Cham. https://doi.org/10.1007/978-3-031-45878-1_9
Download citation
DOI: https://doi.org/10.1007/978-3-031-45878-1_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-45877-4
Online ISBN: 978-3-031-45878-1
eBook Packages: Computer ScienceComputer Science (R0)