A Break Of Barrier To Classical Differential Fault Attack On The Nonce-Based Authenticated Encryption Algorithm

Author:

Liu Shuai1,Ren Jizhou2,Guan Jie1,Hu Bin1,Ma Sudong1,Bai Hao3

Affiliation:

1. PLA SSF Information Engineering University , Zhengzhou 450000 , China

2. Australian National University college of Engineering, Computing and Cybernetics , Canberra 2601 , Australian

3. National University of Defense Technology , Changsha 410000 , China

Abstract

Abstract It had always been believed that there was an inherent barrier to Differential Fault Attack (DFA) on the nonce-based authenticated encryption algorithm. At CHES 2016, Saha et al. proposed an Internal Differential Fault Attack on a parallelizable counter-mode algorithm. They induce the attack to classical DFA at the expense of one more fault injection in every encryption process. In this paper, we propose the DFA on HYENA, which is a nonce-based authenticated encryption mode for GIFT-128. Our work is the first pure classical DFA on a nonce-based authenticated encryption algorithm with only one fault injected in every decryption process. Firstly, we give the DFA on GIFT-128 with a fault injected into the 39th-round input. Based on this work, we inject a fault in the underlying GIFT-128 of a HYENA decryption process and make this decryption process still generate the correct tag and output plaintext. This makes the necessary conditions of DFA satisfied. Experiments show that at most 56 key bits of HYENA can be recovered with only a few faulty ciphertexts. In addition, our fault injection is easier to achieve than most other work about fault attack, because the injection location is relatively random and the fault type can be arbitrary. It should be noted that the left 72 key bits cannot be recovered in this way.

Publisher

Oxford University Press (OUP)

Subject

General Computer Science

Reference24 articles.

1. Optical Fault Induction Attacks. Proceedings of CHES 2002, Redwood Shores;Skorobogatov,2002

2. Power supply glitch induced faults on FPGA: An in-depth analysis of the injection mechanism;Zussa,2013

3. An in-depth and black-box characterization of the e _ ects of clock glitches on 8-bit MCUs;Balasch,2011

4. Fault attacks in symmetric key cryptosystems;Baksi;Cryptology ePrint Archive,2022

5. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract);Boneh,1997

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3