Abstract
This paper describes an attack on cryptographic devices called Differential Behavioral Analysis (or DBA). This is an hybrid attack between two already powerful attacks: differential power analysis (DPA) for the statistical treatment and safe-error attack for the fault type. DBA, simulated on an algorithmic model of AES appears to be very efficient. The attacker is able to recover the entire secret key with byte-wise “stuck-at” faults injected repetitively. A theorical as well as a more realistic approach are presented.
Chapter PDF
Similar content being viewed by others
Keywords
References
http://cmp.imag.fr/information/gallery/details.php?id_circ=64&y=2005
Bertoni, G., Breveglieri, L., Koren, I., Piuri, V.: Fault detection in the Advanced Encryption Standard. In: Proceedings of MPCS 2002, Ischia, Italy (2002)
Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: CHES, pp. 16–29 (2004)
Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37–51. Springer, Heidelberg (1997)
Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The sorcerer’s apprentice guide to fault attacks. In: First Workshop on Fault Detection and Tolerance in Cryptography, Florence, Italy (June 1, 2004)
Blömer, J., Krummel, V.: Fault based collision attacks on aes. In: FDTC, pp. 106–120 (2006)
Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513–525. Springer, Heidelberg (1997)
Blömer, J., Seifert, J.-P.: Fault based cryptanalysis of the Advanced Encryption Standard (AES). In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 162–181. Springer, Heidelberg (2003)
Choukri, H., Tunstall, M.: Round reduction using faults. In: FDTC 2005: Proceedings of the second Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 13–24 (2005)
Daemen, J., Rijmen, V.: The Design of Rijndael. Springer, Heidelberg (2002)
Giraud, C.: DFA on AES. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) Advanced Encryption Standard – AES. LNCS, vol. 3373, pp. 27–41. Springer, Heidelberg (2005)
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)
Kömmerling, O., Kuhn, M.G.: Design principles for tamper-resistant smartcard processors. In: Proceedings of the USENIX Workshop on Smartcard Technology, Chicago, May 10-11, 1999, pp. 9–20 (1999)
Karpovsky, M.G., Kulikowski, K.J., Taubin, A.: Robust protection against fault injection attacks on smart cards implementing the Advanced Encryption Standard. In: 2004 International Conference on Dependable Systems and Networks (DSN 2004), pp. 93–101. IEEE Computer Society Press, Los Alamitos (2004)
Karri, R., Wu, K., Mishra, P., Kim, Y.: Concurrent error detection scheme for fault-based side-channel cryptanalysis of symmetric block ciphers. IEEE Transactions on Computer-Aided Design 21(12), 1509–1517 (2002)
Monnet, Y., Renaudin, M.: Designing resistant circuits against malicious faults injection using asynchronous logic. IEEE Trans. Comput. 55(9), 1104–1115 (2006)
Monnet, Y., Renaudin, M., Leveugle, R., Clavier, C., Moitrel, P.: Case study of a fault attack on asynchronous des crypto-processors. In: FDTC, pp. 88–97 (2006)
Malkin, T.G., Standaert, F.-X., Yung, M.: A comparative cost/security analysis of fault attack countermeasures. In: Second Workshop on Fault Detection and Tolerance in Cryptography, Edinburgh, UK, September 2, pp. 109–123 (2005)
NIST: Announcing the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication, n. 197 (November 26, 2001)
Piret, G., Quisquater, J.-J.: A differential fault attack technique against SPN structures, with application to the AES and Khazad. In: D.Walter, C., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 77–88. Springer, Heidelberg (2003)
Yen, S.-M., Joye, M.: Checking before output may not be enough against fault-based cryptanalysis. IEEE Transactions on Computers 49(9), 967–970 (2000)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Robisson, B., Manet, P. (2007). Differential Behavioral Analysis. In: Paillier, P., Verbauwhede, I. (eds) Cryptographic Hardware and Embedded Systems - CHES 2007. CHES 2007. Lecture Notes in Computer Science, vol 4727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74735-2_28
Download citation
DOI: https://doi.org/10.1007/978-3-540-74735-2_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74734-5
Online ISBN: 978-3-540-74735-2
eBook Packages: Computer ScienceComputer Science (R0)