Cargando…
An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults
Embedded encryption devices and smart sensors are vulnerable to physical attacks. Due to the continuous shrinking of chip size, laser injection, particle radiation and electromagnetic transient injection are possible methods that introduce transient multiple faults. In the fault analysis stage, the...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7181125/ https://www.ncbi.nlm.nih.gov/pubmed/32244774 http://dx.doi.org/10.3390/s20071976 |
_version_ | 1783525976765890560 |
---|---|
author | Dong, Liang Zhang, Hongxin Sun, Shaofei Zhu, Lei Cui, Xiaotong Ghosh, Bablu K. |
author_facet | Dong, Liang Zhang, Hongxin Sun, Shaofei Zhu, Lei Cui, Xiaotong Ghosh, Bablu K. |
author_sort | Dong, Liang |
collection | PubMed |
description | Embedded encryption devices and smart sensors are vulnerable to physical attacks. Due to the continuous shrinking of chip size, laser injection, particle radiation and electromagnetic transient injection are possible methods that introduce transient multiple faults. In the fault analysis stage, the adversary is unclear about the actual number of faults injected. Typically, the single-nibble fault analysis encounters difficulties. Therefore, in this paper, we propose novel ciphertext-only impossible differentials that can analyze the number of random faults to six nibbles. We use the impossible differentials to exclude the secret key that definitely does not exist, and then gradually obtain the unique secret key through inverse difference equations. Using software simulation, we conducted 32,000 random multiple fault attacks on Midori. The experiments were carried out to verify the theoretical model of multiple fault attacks. We obtain the relationship between fault injection and information content. To reduce the number of fault attacks, we further optimized the fault attack method. The secret key can be obtained at least 11 times. The proposed ciphertext-only impossible differential analysis provides an effective method for random multiple faults analysis, which would be helpful for improving the security of block ciphers. |
format | Online Article Text |
id | pubmed-7181125 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-71811252020-04-30 An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults Dong, Liang Zhang, Hongxin Sun, Shaofei Zhu, Lei Cui, Xiaotong Ghosh, Bablu K. Sensors (Basel) Article Embedded encryption devices and smart sensors are vulnerable to physical attacks. Due to the continuous shrinking of chip size, laser injection, particle radiation and electromagnetic transient injection are possible methods that introduce transient multiple faults. In the fault analysis stage, the adversary is unclear about the actual number of faults injected. Typically, the single-nibble fault analysis encounters difficulties. Therefore, in this paper, we propose novel ciphertext-only impossible differentials that can analyze the number of random faults to six nibbles. We use the impossible differentials to exclude the secret key that definitely does not exist, and then gradually obtain the unique secret key through inverse difference equations. Using software simulation, we conducted 32,000 random multiple fault attacks on Midori. The experiments were carried out to verify the theoretical model of multiple fault attacks. We obtain the relationship between fault injection and information content. To reduce the number of fault attacks, we further optimized the fault attack method. The secret key can be obtained at least 11 times. The proposed ciphertext-only impossible differential analysis provides an effective method for random multiple faults analysis, which would be helpful for improving the security of block ciphers. MDPI 2020-04-01 /pmc/articles/PMC7181125/ /pubmed/32244774 http://dx.doi.org/10.3390/s20071976 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Dong, Liang Zhang, Hongxin Sun, Shaofei Zhu, Lei Cui, Xiaotong Ghosh, Bablu K. An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults |
title | An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults |
title_full | An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults |
title_fullStr | An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults |
title_full_unstemmed | An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults |
title_short | An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults |
title_sort | effective simulation analysis of transient electromagnetic multiple faults |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7181125/ https://www.ncbi.nlm.nih.gov/pubmed/32244774 http://dx.doi.org/10.3390/s20071976 |
work_keys_str_mv | AT dongliang aneffectivesimulationanalysisoftransientelectromagneticmultiplefaults AT zhanghongxin aneffectivesimulationanalysisoftransientelectromagneticmultiplefaults AT sunshaofei aneffectivesimulationanalysisoftransientelectromagneticmultiplefaults AT zhulei aneffectivesimulationanalysisoftransientelectromagneticmultiplefaults AT cuixiaotong aneffectivesimulationanalysisoftransientelectromagneticmultiplefaults AT ghoshbabluk aneffectivesimulationanalysisoftransientelectromagneticmultiplefaults AT dongliang effectivesimulationanalysisoftransientelectromagneticmultiplefaults AT zhanghongxin effectivesimulationanalysisoftransientelectromagneticmultiplefaults AT sunshaofei effectivesimulationanalysisoftransientelectromagneticmultiplefaults AT zhulei effectivesimulationanalysisoftransientelectromagneticmultiplefaults AT cuixiaotong effectivesimulationanalysisoftransientelectromagneticmultiplefaults AT ghoshbabluk effectivesimulationanalysisoftransientelectromagneticmultiplefaults |