Physical attacks on block ciphers

The security of a cryptosystem is often compromised, not from a theoretical point of view, but by the leakage caused by the physical implementation of the cryptographic algorithm. A new class of attacks, called physical attacks, has shown the capability to exploit the unintentional physical behavior...

Full description

Saved in:
Bibliographic Details
Main Author: Jap, Dirmanto
Other Authors: Axel Poschmann
Format: Theses and Dissertations
Language:English
Published: 2016
Subjects:
Online Access:https://hdl.handle.net/10356/69409
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-69409
record_format dspace
spelling sg-ntu-dr.10356-694092023-02-28T23:55:06Z Physical attacks on block ciphers Jap, Dirmanto Axel Poschmann Thomas Peyrin School of Physical and Mathematical Sciences DRNTU::Engineering::Computer science and engineering::Data::Data encryption The security of a cryptosystem is often compromised, not from a theoretical point of view, but by the leakage caused by the physical implementation of the cryptographic algorithm. A new class of attacks, called physical attacks, has shown the capability to exploit the unintentional physical behaviors from the cryptographic device, which usually provide enough information to recover the secret keys. Different methods have been proposed for conducting the attacks. Two of the main focus of physical attacks are side-channel attacks and fault attacks. For side-channel attacks, the strongest cryptanalysis can be carried when the attacker can profile the targeted device. In profiling based side-channel attacks, a model is constructed to characterize the leakage behavior from the device. Recently, machine learning algorithms have been proposed as alternatives for the classical profiling based attacks. Machine learning and side-channel analysis are two different fields of study, however they are similar, in a sense that both are mostly dealing with the same problem (i.e., classification). For fault attacks, the aim of the attacker is to disrupt the execution of cryptographic algorithms. Based on the erroneous results, it is possible to gain some additional information regarding the secret key. Many methods can be used to force a fault to the device, however, laser fault injection is still considered as the preferred tools for injecting faults, due to its high precision and repeatability. In this thesis, various aspects of the physical attacks are covered, with an emphasis on block cipher implementation. Specifically, this thesis focuses on several topics: - Using machine learning as a tool for profiling based side-channel at-tacks. We first investigate different machine learning methods as alternative methods for classical profiling based attacks. Then, in the next work, machine learning is utilized for the construction of an accurate leakage model. Lastly, machine learning is used in combination with profiling side-channel attacks for detection of hardware trojan (malicious modification in the device), which can also be extended to the scenario where there is no golden reference. - Investigating theoretical fault attacks and its practicability. We first provide a theoretical fault attacks on LEA block cipher. Then, investigations and experiments are done to highlight the practicability of fault attacks, focusing on laser fault injections on smart cards. DOCTOR OF PHILOSOPHY (SPMS) 2016-12-28T05:50:43Z 2016-12-28T05:50:43Z 2016 Thesis Jap, D. (2016). Physical attacks on block ciphers. Doctoral thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/69409 10.32657/10356/69409 en 197 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Computer science and engineering::Data::Data encryption
spellingShingle DRNTU::Engineering::Computer science and engineering::Data::Data encryption
Jap, Dirmanto
Physical attacks on block ciphers
description The security of a cryptosystem is often compromised, not from a theoretical point of view, but by the leakage caused by the physical implementation of the cryptographic algorithm. A new class of attacks, called physical attacks, has shown the capability to exploit the unintentional physical behaviors from the cryptographic device, which usually provide enough information to recover the secret keys. Different methods have been proposed for conducting the attacks. Two of the main focus of physical attacks are side-channel attacks and fault attacks. For side-channel attacks, the strongest cryptanalysis can be carried when the attacker can profile the targeted device. In profiling based side-channel attacks, a model is constructed to characterize the leakage behavior from the device. Recently, machine learning algorithms have been proposed as alternatives for the classical profiling based attacks. Machine learning and side-channel analysis are two different fields of study, however they are similar, in a sense that both are mostly dealing with the same problem (i.e., classification). For fault attacks, the aim of the attacker is to disrupt the execution of cryptographic algorithms. Based on the erroneous results, it is possible to gain some additional information regarding the secret key. Many methods can be used to force a fault to the device, however, laser fault injection is still considered as the preferred tools for injecting faults, due to its high precision and repeatability. In this thesis, various aspects of the physical attacks are covered, with an emphasis on block cipher implementation. Specifically, this thesis focuses on several topics: - Using machine learning as a tool for profiling based side-channel at-tacks. We first investigate different machine learning methods as alternative methods for classical profiling based attacks. Then, in the next work, machine learning is utilized for the construction of an accurate leakage model. Lastly, machine learning is used in combination with profiling side-channel attacks for detection of hardware trojan (malicious modification in the device), which can also be extended to the scenario where there is no golden reference. - Investigating theoretical fault attacks and its practicability. We first provide a theoretical fault attacks on LEA block cipher. Then, investigations and experiments are done to highlight the practicability of fault attacks, focusing on laser fault injections on smart cards.
author2 Axel Poschmann
author_facet Axel Poschmann
Jap, Dirmanto
format Theses and Dissertations
author Jap, Dirmanto
author_sort Jap, Dirmanto
title Physical attacks on block ciphers
title_short Physical attacks on block ciphers
title_full Physical attacks on block ciphers
title_fullStr Physical attacks on block ciphers
title_full_unstemmed Physical attacks on block ciphers
title_sort physical attacks on block ciphers
publishDate 2016
url https://hdl.handle.net/10356/69409
_version_ 1759857401963479040