One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-Like Block Ciphers

We present the first practically realizable sidechannel assisted fault attack on PRESENT, that can retrieve the last round key efficiently using single nibble faults. The attack demonstrates how side-channel leakage can allow the adversary to precisely determine the fault mask resulting from a nibbl...

Full description

Saved in:
Bibliographic Details
Main Authors: Patranabis, Sikhar, Mukhopadhyay, Debdeep, Breier, Jakub, Bhasin, Shivam
Other Authors: 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)
Format: Conference or Workshop Item
Language:English
Published: 2018
Subjects:
DPA
DFA
Online Access:https://hdl.handle.net/10356/88742
http://hdl.handle.net/10220/44738
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-88742
record_format dspace
spelling sg-ntu-dr.10356-887422020-09-26T22:16:13Z One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-Like Block Ciphers Patranabis, Sikhar Mukhopadhyay, Debdeep Breier, Jakub Bhasin, Shivam 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) Temasek Laboratories DPA DFA We present the first practically realizable sidechannel assisted fault attack on PRESENT, that can retrieve the last round key efficiently using single nibble faults. The attack demonstrates how side-channel leakage can allow the adversary to precisely determine the fault mask resulting from a nibble fault injection instance. We first demonstrate the viability of such an attack model via side-channel analysis experiments on top of a laser-based fault injection setup, targeting a PRESENT-80 implementation on an ATmega328P microcontroller. Subsequently, we present a differential fault analysis (DFA) exploiting the knowledge of the output fault mask in the target round to recover multiple last round key nibbles independently and in parallel. Both analytically and through experimental evidence, we show that the combined attack can recover the last round key of PRESENT with 4 random nibble fault injections in the best case, and around 7- 8 nibble fault injections in the average case. Our attack sheds light on a hitherto unexplored vulnerability of PRESENT and PRESENT-like block ciphers that use bit-permutations instead of maximum distance separable (MDS) layers for diffusion. Accepted version 2018-05-03T04:22:38Z 2019-12-06T17:09:59Z 2018-05-03T04:22:38Z 2019-12-06T17:09:59Z 2017-12-01 2017 Conference Paper Patranabis, S., Mukhopadhyay, D., Breier, J., & Bhasin, S. (2017). One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-Like Block Ciphers. 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 25-32. https://hdl.handle.net/10356/88742 http://hdl.handle.net/10220/44738 10.1109/FDTC.2017.11 206825 en © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: [http://dx.doi.org/10.1109/FDTC.2017.11]. 8 p. application/pdf
institution Nanyang Technological University
building NTU Library
country Singapore
collection DR-NTU
language English
topic DPA
DFA
spellingShingle DPA
DFA
Patranabis, Sikhar
Mukhopadhyay, Debdeep
Breier, Jakub
Bhasin, Shivam
One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-Like Block Ciphers
description We present the first practically realizable sidechannel assisted fault attack on PRESENT, that can retrieve the last round key efficiently using single nibble faults. The attack demonstrates how side-channel leakage can allow the adversary to precisely determine the fault mask resulting from a nibble fault injection instance. We first demonstrate the viability of such an attack model via side-channel analysis experiments on top of a laser-based fault injection setup, targeting a PRESENT-80 implementation on an ATmega328P microcontroller. Subsequently, we present a differential fault analysis (DFA) exploiting the knowledge of the output fault mask in the target round to recover multiple last round key nibbles independently and in parallel. Both analytically and through experimental evidence, we show that the combined attack can recover the last round key of PRESENT with 4 random nibble fault injections in the best case, and around 7- 8 nibble fault injections in the average case. Our attack sheds light on a hitherto unexplored vulnerability of PRESENT and PRESENT-like block ciphers that use bit-permutations instead of maximum distance separable (MDS) layers for diffusion.
author2 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)
author_facet 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)
Patranabis, Sikhar
Mukhopadhyay, Debdeep
Breier, Jakub
Bhasin, Shivam
format Conference or Workshop Item
author Patranabis, Sikhar
Mukhopadhyay, Debdeep
Breier, Jakub
Bhasin, Shivam
author_sort Patranabis, Sikhar
title One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-Like Block Ciphers
title_short One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-Like Block Ciphers
title_full One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-Like Block Ciphers
title_fullStr One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-Like Block Ciphers
title_full_unstemmed One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-Like Block Ciphers
title_sort one plus one is more than two: a practical combination of power and fault analysis attacks on present and present-like block ciphers
publishDate 2018
url https://hdl.handle.net/10356/88742
http://hdl.handle.net/10220/44738
_version_ 1681059375999877120