Exploiting statistical effective fault attack in a blind setting

Abstract In order to obtain the secret key, the majority of physical attacks require knowledge of the plaintext or ciphertext, which may be unavailable or cannot be exploited. Blind attacks are introduced to do key recovery in circumstances where the adversary has no direct access to plaintext and c...

Full description

Saved in:
Bibliographic Details
Main Authors: Navid Vafaei, Hadi Soleimany, Nasour Bagheri
Format: Article
Language:English
Published: Wiley 2023-07-01
Series:IET Information Security
Subjects:
Online Access:https://doi.org/10.1049/ise2.12121
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832558543891333120
author Navid Vafaei
Hadi Soleimany
Nasour Bagheri
author_facet Navid Vafaei
Hadi Soleimany
Nasour Bagheri
author_sort Navid Vafaei
collection DOAJ
description Abstract In order to obtain the secret key, the majority of physical attacks require knowledge of the plaintext or ciphertext, which may be unavailable or cannot be exploited. Blind attacks are introduced to do key recovery in circumstances where the adversary has no direct access to plaintext and ciphertext. A combination of fault and power attacks can circumvent typical countermeasures in this setting, for example, Fault Template Attack (FTA). However, FTA relies on bit fault injection, which is difficult to implement in practice. The SIFA‐blind, a framework for executing the Statistical Ineffective Fault Attack, is more flexible, but sensitivity to setup noise and missed faults is its main drawback. To address this deficiency, we suggest two ways to use Statistical Effective Fault Attack in a blind setting that are much less affected by missed faults and noise when measuring power traces, even though they do not use fault injection at the bit level. In order to demonstrate the viability and adaptability of our proposed attacks, we injected a fault via glitch frequency onto the ChipWhisperer board. While SEFA‐blind does not need a bit‐level fault, our results demonstrate that it is better than SIFA‐blind when the number of missed faults increases.
format Article
id doaj-art-98e8e668e7b94741bdd6c04f2e304a4f
institution Kabale University
issn 1751-8709
1751-8717
language English
publishDate 2023-07-01
publisher Wiley
record_format Article
series IET Information Security
spelling doaj-art-98e8e668e7b94741bdd6c04f2e304a4f2025-02-03T01:32:08ZengWileyIET Information Security1751-87091751-87172023-07-0117463964610.1049/ise2.12121Exploiting statistical effective fault attack in a blind settingNavid Vafaei0Hadi Soleimany1Nasour Bagheri2Department of Electrical Engineering Shahid Rajaee Teacher Training University Tehran IranCyberspace Research Institute Shahid Beheshti University Tajrish IranDepartment of Electrical Engineering Shahid Rajaee Teacher Training University Tehran IranAbstract In order to obtain the secret key, the majority of physical attacks require knowledge of the plaintext or ciphertext, which may be unavailable or cannot be exploited. Blind attacks are introduced to do key recovery in circumstances where the adversary has no direct access to plaintext and ciphertext. A combination of fault and power attacks can circumvent typical countermeasures in this setting, for example, Fault Template Attack (FTA). However, FTA relies on bit fault injection, which is difficult to implement in practice. The SIFA‐blind, a framework for executing the Statistical Ineffective Fault Attack, is more flexible, but sensitivity to setup noise and missed faults is its main drawback. To address this deficiency, we suggest two ways to use Statistical Effective Fault Attack in a blind setting that are much less affected by missed faults and noise when measuring power traces, even though they do not use fault injection at the bit level. In order to demonstrate the viability and adaptability of our proposed attacks, we injected a fault via glitch frequency onto the ChipWhisperer board. While SEFA‐blind does not need a bit‐level fault, our results demonstrate that it is better than SIFA‐blind when the number of missed faults increases.https://doi.org/10.1049/ise2.12121cryptographyfault simulationsecurity of data
spellingShingle Navid Vafaei
Hadi Soleimany
Nasour Bagheri
Exploiting statistical effective fault attack in a blind setting
IET Information Security
cryptography
fault simulation
security of data
title Exploiting statistical effective fault attack in a blind setting
title_full Exploiting statistical effective fault attack in a blind setting
title_fullStr Exploiting statistical effective fault attack in a blind setting
title_full_unstemmed Exploiting statistical effective fault attack in a blind setting
title_short Exploiting statistical effective fault attack in a blind setting
title_sort exploiting statistical effective fault attack in a blind setting
topic cryptography
fault simulation
security of data
url https://doi.org/10.1049/ise2.12121
work_keys_str_mv AT navidvafaei exploitingstatisticaleffectivefaultattackinablindsetting
AT hadisoleimany exploitingstatisticaleffectivefaultattackinablindsetting
AT nasourbagheri exploitingstatisticaleffectivefaultattackinablindsetting