Exploiting statistical effective fault attack in a blind setting
Abstract In order to obtain the secret key, the majority of physical attacks require knowledge of the plaintext or ciphertext, which may be unavailable or cannot be exploited. Blind attacks are introduced to do key recovery in circumstances where the adversary has no direct access to plaintext and c...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2023-07-01
|
Series: | IET Information Security |
Subjects: | |
Online Access: | https://doi.org/10.1049/ise2.12121 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832558543891333120 |
---|---|
author | Navid Vafaei Hadi Soleimany Nasour Bagheri |
author_facet | Navid Vafaei Hadi Soleimany Nasour Bagheri |
author_sort | Navid Vafaei |
collection | DOAJ |
description | Abstract In order to obtain the secret key, the majority of physical attacks require knowledge of the plaintext or ciphertext, which may be unavailable or cannot be exploited. Blind attacks are introduced to do key recovery in circumstances where the adversary has no direct access to plaintext and ciphertext. A combination of fault and power attacks can circumvent typical countermeasures in this setting, for example, Fault Template Attack (FTA). However, FTA relies on bit fault injection, which is difficult to implement in practice. The SIFA‐blind, a framework for executing the Statistical Ineffective Fault Attack, is more flexible, but sensitivity to setup noise and missed faults is its main drawback. To address this deficiency, we suggest two ways to use Statistical Effective Fault Attack in a blind setting that are much less affected by missed faults and noise when measuring power traces, even though they do not use fault injection at the bit level. In order to demonstrate the viability and adaptability of our proposed attacks, we injected a fault via glitch frequency onto the ChipWhisperer board. While SEFA‐blind does not need a bit‐level fault, our results demonstrate that it is better than SIFA‐blind when the number of missed faults increases. |
format | Article |
id | doaj-art-98e8e668e7b94741bdd6c04f2e304a4f |
institution | Kabale University |
issn | 1751-8709 1751-8717 |
language | English |
publishDate | 2023-07-01 |
publisher | Wiley |
record_format | Article |
series | IET Information Security |
spelling | doaj-art-98e8e668e7b94741bdd6c04f2e304a4f2025-02-03T01:32:08ZengWileyIET Information Security1751-87091751-87172023-07-0117463964610.1049/ise2.12121Exploiting statistical effective fault attack in a blind settingNavid Vafaei0Hadi Soleimany1Nasour Bagheri2Department of Electrical Engineering Shahid Rajaee Teacher Training University Tehran IranCyberspace Research Institute Shahid Beheshti University Tajrish IranDepartment of Electrical Engineering Shahid Rajaee Teacher Training University Tehran IranAbstract In order to obtain the secret key, the majority of physical attacks require knowledge of the plaintext or ciphertext, which may be unavailable or cannot be exploited. Blind attacks are introduced to do key recovery in circumstances where the adversary has no direct access to plaintext and ciphertext. A combination of fault and power attacks can circumvent typical countermeasures in this setting, for example, Fault Template Attack (FTA). However, FTA relies on bit fault injection, which is difficult to implement in practice. The SIFA‐blind, a framework for executing the Statistical Ineffective Fault Attack, is more flexible, but sensitivity to setup noise and missed faults is its main drawback. To address this deficiency, we suggest two ways to use Statistical Effective Fault Attack in a blind setting that are much less affected by missed faults and noise when measuring power traces, even though they do not use fault injection at the bit level. In order to demonstrate the viability and adaptability of our proposed attacks, we injected a fault via glitch frequency onto the ChipWhisperer board. While SEFA‐blind does not need a bit‐level fault, our results demonstrate that it is better than SIFA‐blind when the number of missed faults increases.https://doi.org/10.1049/ise2.12121cryptographyfault simulationsecurity of data |
spellingShingle | Navid Vafaei Hadi Soleimany Nasour Bagheri Exploiting statistical effective fault attack in a blind setting IET Information Security cryptography fault simulation security of data |
title | Exploiting statistical effective fault attack in a blind setting |
title_full | Exploiting statistical effective fault attack in a blind setting |
title_fullStr | Exploiting statistical effective fault attack in a blind setting |
title_full_unstemmed | Exploiting statistical effective fault attack in a blind setting |
title_short | Exploiting statistical effective fault attack in a blind setting |
title_sort | exploiting statistical effective fault attack in a blind setting |
topic | cryptography fault simulation security of data |
url | https://doi.org/10.1049/ise2.12121 |
work_keys_str_mv | AT navidvafaei exploitingstatisticaleffectivefaultattackinablindsetting AT hadisoleimany exploitingstatisticaleffectivefaultattackinablindsetting AT nasourbagheri exploitingstatisticaleffectivefaultattackinablindsetting |