Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers

Fault analysis is a very powerful technique to break cryptographic implementations. In particular, bit-level fault analysis (BLFA), where faults are injected by flipping one or a few isolated bits, are among the most efficient of the lot. BLFA requires both precise fault injection capabilities and s...

Full description

Saved in:
Bibliographic Details
Main Authors: He, Wei, Zhang, Fan, Zhao, Xinjie, Bhasin, Shivam, Guo, Shize
Other Authors: Temasek Laboratories
Format: Article
Language:English
Published: 2017
Subjects:
Online Access:https://hdl.handle.net/10356/82841
http://hdl.handle.net/10220/42346
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-82841
record_format dspace
spelling sg-ntu-dr.10356-828412020-09-26T22:18:28Z Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers He, Wei Zhang, Fan Zhao, Xinjie Bhasin, Shivam Guo, Shize Temasek Laboratories Bit-level fault attacks Hardware trojan Fault analysis is a very powerful technique to break cryptographic implementations. In particular, bit-level fault analysis (BLFA), where faults are injected by flipping one or a few isolated bits, are among the most efficient of the lot. BLFA requires both precise fault injection capabilities and sophisticated key extraction skills. Algebraic fault analysis (AFA) is a good analysis technique for BLFA. Compared with differential fault analysis (DFA), AFA relies on the automation from machine solvers. Since it fully utilizes the leakages along propagation paths, it can extract the whole key when there is only one or a few bits infected, and when the injection is into the much deeper rounds. In practice, it is very difficult to inject precise bit-level faults and expensive equipments are indeed required. However, if the underlying cryptographic hardware is maliciously modified, BLFA can be easily achieved. This recent security threat is popularly known as Hardware trojan horse (HTH). HTH is a by-product of much popular and economically necessary outsourcing trend in semiconductors. A well designed HTH can precisely inject any type of faults to enable AFA and bypass detections, by having low cost and with low activation rate. Accepted version 2017-05-05T08:17:12Z 2019-12-06T15:06:41Z 2017-05-05T08:17:12Z 2019-12-06T15:06:41Z 2017 2017 Journal Article Zhang, F., Zhao, X., He, W., Bhasin, S., & Guo, S. (2017). Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers. Science China Information Sciences, 60, 048102-. 1674-733X https://hdl.handle.net/10356/82841 http://hdl.handle.net/10220/42346 10.1007/s11432-016-0233-0 192778 en Science China Information Sciences © 2017 Science China Press and Springer-Verlag Berlin Heidelberg. This is the author created version of a work that has been peer reviewed and accepted for publication by Science China Information Sciences, Science China Press and Springer-Verlag Berlin Heidelberg. It incorporates referee’s comments but changes resulting from the publishing process, such as copyediting, structural formatting, may not be reflected in this document. The published version is available at: [http://dx.doi.org/10.1007/s11432-016-0233-0]. 3 p. application/pdf
institution Nanyang Technological University
building NTU Library
country Singapore
collection DR-NTU
language English
topic Bit-level fault attacks
Hardware trojan
spellingShingle Bit-level fault attacks
Hardware trojan
He, Wei
Zhang, Fan
Zhao, Xinjie
Bhasin, Shivam
Guo, Shize
Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers
description Fault analysis is a very powerful technique to break cryptographic implementations. In particular, bit-level fault analysis (BLFA), where faults are injected by flipping one or a few isolated bits, are among the most efficient of the lot. BLFA requires both precise fault injection capabilities and sophisticated key extraction skills. Algebraic fault analysis (AFA) is a good analysis technique for BLFA. Compared with differential fault analysis (DFA), AFA relies on the automation from machine solvers. Since it fully utilizes the leakages along propagation paths, it can extract the whole key when there is only one or a few bits infected, and when the injection is into the much deeper rounds. In practice, it is very difficult to inject precise bit-level faults and expensive equipments are indeed required. However, if the underlying cryptographic hardware is maliciously modified, BLFA can be easily achieved. This recent security threat is popularly known as Hardware trojan horse (HTH). HTH is a by-product of much popular and economically necessary outsourcing trend in semiconductors. A well designed HTH can precisely inject any type of faults to enable AFA and bypass detections, by having low cost and with low activation rate.
author2 Temasek Laboratories
author_facet Temasek Laboratories
He, Wei
Zhang, Fan
Zhao, Xinjie
Bhasin, Shivam
Guo, Shize
format Article
author He, Wei
Zhang, Fan
Zhao, Xinjie
Bhasin, Shivam
Guo, Shize
author_sort He, Wei
title Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers
title_short Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers
title_full Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers
title_fullStr Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers
title_full_unstemmed Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers
title_sort low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers
publishDate 2017
url https://hdl.handle.net/10356/82841
http://hdl.handle.net/10220/42346
_version_ 1681058267434844160