Cargando…

An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults

Embedded encryption devices and smart sensors are vulnerable to physical attacks. Due to the continuous shrinking of chip size, laser injection, particle radiation and electromagnetic transient injection are possible methods that introduce transient multiple faults. In the fault analysis stage, the...

Descripción completa

Detalles Bibliográficos
Autores principales: Dong, Liang, Zhang, Hongxin, Sun, Shaofei, Zhu, Lei, Cui, Xiaotong, Ghosh, Bablu K.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7181125/
https://www.ncbi.nlm.nih.gov/pubmed/32244774
http://dx.doi.org/10.3390/s20071976
_version_ 1783525976765890560
author Dong, Liang
Zhang, Hongxin
Sun, Shaofei
Zhu, Lei
Cui, Xiaotong
Ghosh, Bablu K.
author_facet Dong, Liang
Zhang, Hongxin
Sun, Shaofei
Zhu, Lei
Cui, Xiaotong
Ghosh, Bablu K.
author_sort Dong, Liang
collection PubMed
description Embedded encryption devices and smart sensors are vulnerable to physical attacks. Due to the continuous shrinking of chip size, laser injection, particle radiation and electromagnetic transient injection are possible methods that introduce transient multiple faults. In the fault analysis stage, the adversary is unclear about the actual number of faults injected. Typically, the single-nibble fault analysis encounters difficulties. Therefore, in this paper, we propose novel ciphertext-only impossible differentials that can analyze the number of random faults to six nibbles. We use the impossible differentials to exclude the secret key that definitely does not exist, and then gradually obtain the unique secret key through inverse difference equations. Using software simulation, we conducted 32,000 random multiple fault attacks on Midori. The experiments were carried out to verify the theoretical model of multiple fault attacks. We obtain the relationship between fault injection and information content. To reduce the number of fault attacks, we further optimized the fault attack method. The secret key can be obtained at least 11 times. The proposed ciphertext-only impossible differential analysis provides an effective method for random multiple faults analysis, which would be helpful for improving the security of block ciphers.
format Online
Article
Text
id pubmed-7181125
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-71811252020-04-30 An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults Dong, Liang Zhang, Hongxin Sun, Shaofei Zhu, Lei Cui, Xiaotong Ghosh, Bablu K. Sensors (Basel) Article Embedded encryption devices and smart sensors are vulnerable to physical attacks. Due to the continuous shrinking of chip size, laser injection, particle radiation and electromagnetic transient injection are possible methods that introduce transient multiple faults. In the fault analysis stage, the adversary is unclear about the actual number of faults injected. Typically, the single-nibble fault analysis encounters difficulties. Therefore, in this paper, we propose novel ciphertext-only impossible differentials that can analyze the number of random faults to six nibbles. We use the impossible differentials to exclude the secret key that definitely does not exist, and then gradually obtain the unique secret key through inverse difference equations. Using software simulation, we conducted 32,000 random multiple fault attacks on Midori. The experiments were carried out to verify the theoretical model of multiple fault attacks. We obtain the relationship between fault injection and information content. To reduce the number of fault attacks, we further optimized the fault attack method. The secret key can be obtained at least 11 times. The proposed ciphertext-only impossible differential analysis provides an effective method for random multiple faults analysis, which would be helpful for improving the security of block ciphers. MDPI 2020-04-01 /pmc/articles/PMC7181125/ /pubmed/32244774 http://dx.doi.org/10.3390/s20071976 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Dong, Liang
Zhang, Hongxin
Sun, Shaofei
Zhu, Lei
Cui, Xiaotong
Ghosh, Bablu K.
An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults
title An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults
title_full An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults
title_fullStr An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults
title_full_unstemmed An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults
title_short An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults
title_sort effective simulation analysis of transient electromagnetic multiple faults
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7181125/
https://www.ncbi.nlm.nih.gov/pubmed/32244774
http://dx.doi.org/10.3390/s20071976
work_keys_str_mv AT dongliang aneffectivesimulationanalysisoftransientelectromagneticmultiplefaults
AT zhanghongxin aneffectivesimulationanalysisoftransientelectromagneticmultiplefaults
AT sunshaofei aneffectivesimulationanalysisoftransientelectromagneticmultiplefaults
AT zhulei aneffectivesimulationanalysisoftransientelectromagneticmultiplefaults
AT cuixiaotong aneffectivesimulationanalysisoftransientelectromagneticmultiplefaults
AT ghoshbabluk aneffectivesimulationanalysisoftransientelectromagneticmultiplefaults
AT dongliang effectivesimulationanalysisoftransientelectromagneticmultiplefaults
AT zhanghongxin effectivesimulationanalysisoftransientelectromagneticmultiplefaults
AT sunshaofei effectivesimulationanalysisoftransientelectromagneticmultiplefaults
AT zhulei effectivesimulationanalysisoftransientelectromagneticmultiplefaults
AT cuixiaotong effectivesimulationanalysisoftransientelectromagneticmultiplefaults
AT ghoshbabluk effectivesimulationanalysisoftransientelectromagneticmultiplefaults