Physical attacks on block ciphers
The security of a cryptosystem is often compromised, not from a theoretical point of view, but by the leakage caused by the physical implementation of the cryptographic algorithm. A new class of attacks, called physical attacks, has shown the capability to exploit the unintentional physical behavior...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Theses and Dissertations |
Language: | English |
Published: |
2016
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/69409 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-69409 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-694092023-02-28T23:55:06Z Physical attacks on block ciphers Jap, Dirmanto Axel Poschmann Thomas Peyrin School of Physical and Mathematical Sciences DRNTU::Engineering::Computer science and engineering::Data::Data encryption The security of a cryptosystem is often compromised, not from a theoretical point of view, but by the leakage caused by the physical implementation of the cryptographic algorithm. A new class of attacks, called physical attacks, has shown the capability to exploit the unintentional physical behaviors from the cryptographic device, which usually provide enough information to recover the secret keys. Different methods have been proposed for conducting the attacks. Two of the main focus of physical attacks are side-channel attacks and fault attacks. For side-channel attacks, the strongest cryptanalysis can be carried when the attacker can profile the targeted device. In profiling based side-channel attacks, a model is constructed to characterize the leakage behavior from the device. Recently, machine learning algorithms have been proposed as alternatives for the classical profiling based attacks. Machine learning and side-channel analysis are two different fields of study, however they are similar, in a sense that both are mostly dealing with the same problem (i.e., classification). For fault attacks, the aim of the attacker is to disrupt the execution of cryptographic algorithms. Based on the erroneous results, it is possible to gain some additional information regarding the secret key. Many methods can be used to force a fault to the device, however, laser fault injection is still considered as the preferred tools for injecting faults, due to its high precision and repeatability. In this thesis, various aspects of the physical attacks are covered, with an emphasis on block cipher implementation. Specifically, this thesis focuses on several topics: - Using machine learning as a tool for profiling based side-channel at-tacks. We first investigate different machine learning methods as alternative methods for classical profiling based attacks. Then, in the next work, machine learning is utilized for the construction of an accurate leakage model. Lastly, machine learning is used in combination with profiling side-channel attacks for detection of hardware trojan (malicious modification in the device), which can also be extended to the scenario where there is no golden reference. - Investigating theoretical fault attacks and its practicability. We first provide a theoretical fault attacks on LEA block cipher. Then, investigations and experiments are done to highlight the practicability of fault attacks, focusing on laser fault injections on smart cards. DOCTOR OF PHILOSOPHY (SPMS) 2016-12-28T05:50:43Z 2016-12-28T05:50:43Z 2016 Thesis Jap, D. (2016). Physical attacks on block ciphers. Doctoral thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/69409 10.32657/10356/69409 en 197 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Computer science and engineering::Data::Data encryption |
spellingShingle |
DRNTU::Engineering::Computer science and engineering::Data::Data encryption Jap, Dirmanto Physical attacks on block ciphers |
description |
The security of a cryptosystem is often compromised, not from a theoretical point of view, but by the leakage caused by the physical implementation of the cryptographic algorithm. A new class of attacks, called physical attacks, has shown the capability to exploit the unintentional physical behaviors from the cryptographic device, which usually provide enough information to recover the secret keys. Different methods have been proposed for conducting the attacks. Two of the main focus of physical attacks are side-channel attacks and fault attacks. For side-channel attacks, the strongest cryptanalysis can be carried when the attacker can profile the targeted device. In profiling based side-channel attacks, a model is constructed to characterize the leakage behavior from the device. Recently, machine learning algorithms have been proposed as alternatives for the classical profiling based attacks. Machine learning and side-channel analysis are two different fields of study, however they are similar, in a sense that both are mostly dealing with the same problem (i.e., classification). For fault attacks, the aim of the attacker is to disrupt the execution of cryptographic algorithms. Based on the erroneous results, it is possible to gain some additional information regarding the secret key. Many methods can be used to force a fault to the device, however, laser fault injection is still considered as the preferred tools for injecting faults, due to its high precision and repeatability. In this thesis, various aspects of the physical attacks are covered, with an emphasis on block cipher implementation. Specifically, this thesis focuses on several topics: - Using machine learning as a tool for profiling based side-channel at-tacks. We first investigate different machine learning methods as alternative methods for classical profiling based attacks. Then, in the next work, machine learning is utilized for the construction of an accurate leakage model. Lastly, machine learning is used in combination with profiling side-channel attacks for detection of hardware trojan (malicious modification in the device), which can also be extended to the scenario where there is no golden reference. - Investigating theoretical fault attacks and its practicability. We first provide a theoretical fault attacks on LEA block cipher. Then, investigations and experiments are done to highlight the practicability of fault attacks, focusing on laser fault injections on smart cards. |
author2 |
Axel Poschmann |
author_facet |
Axel Poschmann Jap, Dirmanto |
format |
Theses and Dissertations |
author |
Jap, Dirmanto |
author_sort |
Jap, Dirmanto |
title |
Physical attacks on block ciphers |
title_short |
Physical attacks on block ciphers |
title_full |
Physical attacks on block ciphers |
title_fullStr |
Physical attacks on block ciphers |
title_full_unstemmed |
Physical attacks on block ciphers |
title_sort |
physical attacks on block ciphers |
publishDate |
2016 |
url |
https://hdl.handle.net/10356/69409 |
_version_ |
1759857401963479040 |