Bypassing Parity Protected Cryptography using Laser Fault Injection in Cyber-Physical System
Lightweight cryptography has been widely utilized in resource constrained embedded devices of Cyber-Physical System (CPS) terminals. The hostile and unattended environment in many scenarios make those endpoints easy to be attacked by hardware based techniques. As a resourceefficient countermeasure a...
Saved in:
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2016
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/80681 http://hdl.handle.net/10220/40620 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-80681 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-806812020-09-26T22:15:39Z Bypassing Parity Protected Cryptography using Laser Fault Injection in Cyber-Physical System He, Wei Breier, Jakub Bhasin, Shivam Chattopadhyay, Anupam School of Computer Engineering Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security (CPSS 2016) Temasek Laboratories Concurrent Error Detection (CED) Laser Fault Injection Parity Register Bit-Flip FPGA Cyber-Physical System Lightweight cryptography has been widely utilized in resource constrained embedded devices of Cyber-Physical System (CPS) terminals. The hostile and unattended environment in many scenarios make those endpoints easy to be attacked by hardware based techniques. As a resourceefficient countermeasure against Fault Attacks, parity Concurrent Error Detection (CED) is preferably integrated with security-critical algorithm in CPS terminals. The parity bit changes if an odd number of faults occur during the cipher execution. In this paper, we analyze the effectiveness of fault detection of a parity CED protected cipher (PRESENT) using laser fault injection. The experimental results show that the laser perturbation to encryption can easily flip an even number of data bits, where the faults cannot be detected by parity. Due to the similarity of different parity structures, our attack can bypass almost all parity protections in block ciphers. Some suggestions are given to enhance the security of parity implementations. Accepted version 2016-06-07T03:09:33Z 2019-12-06T13:54:36Z 2016-06-07T03:09:33Z 2019-12-06T13:54:36Z 2016 2016 Conference Paper He, W., Breier, J., Bhasin, S., & Chattopadhyay, A. (2016). Bypassing Parity Protected Cryptography using Laser Fault Injection in Cyber-Physical System. Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, 15-21. https://hdl.handle.net/10356/80681 http://hdl.handle.net/10220/40620 10.1145/2899015.2899019 192775 en © 2016 Association for Computing Machinery (ACM). This is the author created version of a work that has been peer reviewed and accepted for publication by Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security (CPSS 2016), Association for Computing Machinery (ACM). It incorporates referee’s comments but changes resulting from the publishing process, such as copyediting, structural formatting, may not be reflected in this document. The published version is available at: [http://dx.doi.org/10.1145/2899015.2899019]. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
country |
Singapore |
collection |
DR-NTU |
language |
English |
topic |
Concurrent Error Detection (CED) Laser Fault Injection Parity Register Bit-Flip FPGA Cyber-Physical System |
spellingShingle |
Concurrent Error Detection (CED) Laser Fault Injection Parity Register Bit-Flip FPGA Cyber-Physical System He, Wei Breier, Jakub Bhasin, Shivam Chattopadhyay, Anupam Bypassing Parity Protected Cryptography using Laser Fault Injection in Cyber-Physical System |
description |
Lightweight cryptography has been widely utilized in resource constrained embedded devices of Cyber-Physical System (CPS) terminals. The hostile and unattended environment in many scenarios make those endpoints easy to be attacked by hardware based techniques. As a resourceefficient countermeasure against Fault Attacks, parity Concurrent Error Detection (CED) is preferably integrated with security-critical algorithm in CPS terminals. The parity bit changes if an odd number of faults occur during the cipher
execution. In this paper, we analyze the effectiveness of fault detection of a parity CED protected cipher (PRESENT) using laser fault injection. The experimental results show that
the laser perturbation to encryption can easily flip an even number of data bits, where the faults cannot be detected by parity. Due to the similarity of different parity structures,
our attack can bypass almost all parity protections in block ciphers. Some suggestions are given to enhance the security of parity implementations. |
author2 |
School of Computer Engineering |
author_facet |
School of Computer Engineering He, Wei Breier, Jakub Bhasin, Shivam Chattopadhyay, Anupam |
format |
Conference or Workshop Item |
author |
He, Wei Breier, Jakub Bhasin, Shivam Chattopadhyay, Anupam |
author_sort |
He, Wei |
title |
Bypassing Parity Protected Cryptography using Laser Fault Injection in Cyber-Physical System |
title_short |
Bypassing Parity Protected Cryptography using Laser Fault Injection in Cyber-Physical System |
title_full |
Bypassing Parity Protected Cryptography using Laser Fault Injection in Cyber-Physical System |
title_fullStr |
Bypassing Parity Protected Cryptography using Laser Fault Injection in Cyber-Physical System |
title_full_unstemmed |
Bypassing Parity Protected Cryptography using Laser Fault Injection in Cyber-Physical System |
title_sort |
bypassing parity protected cryptography using laser fault injection in cyber-physical system |
publishDate |
2016 |
url |
https://hdl.handle.net/10356/80681 http://hdl.handle.net/10220/40620 |
_version_ |
1681058058034216960 |