Skip to main content

An Automated Framework for Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers

  • Chapter
  • First Online:
Automated Methods in Cryptographic Fault Analysis

Abstract

Algebraic fault analysis (AFA), which combines algebraic cryptanalysis with fault attacks, has represented serious threats to the security of lightweight block ciphers. Inspired by an earlier framework for the analysis of side-channel attacks presented at EUROCRYPT 2009, a new generic framework is proposed to analyze and evaluate algebraic fault attacks on lightweight block ciphers. We interpret AFA at three levels: the target, the adversary, and the evaluator. We describe the capability of an adversary in four parts: the fault injector, the fault model describer, the cipher describer, and the machine solver. A formal fault model is provided to cover most of the current fault attacks. Different strategies of building optimal equation set are also provided to accelerate the solving process. At the evaluator level, we consider the approximate information metric and the actual security metric. These metrics can be used to guide adversaries, cipher designers, and industrial engineers. To verify the feasibility of the proposed framework, we make a comprehensive study of AFA on an ultra-lightweight block cipher called LBlock. Three scenarios are exploited which include injecting a fault to encryption, to key scheduling, or modifying the round number or counter. Our best results show that a single fault injection is enough to recover the master key of LBlock within the affordable complexity in each scenario.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, C. Whelan, The Sorcerer’s apprentice guide to fault attacks. Proc. IEEE 94(2), 370–382 (2006)

    Article  Google Scholar 

  2. E. Biham, A. Shamir, Differential fault analysis of secret key cryptosystems, in B.S. Kaliski Jr. (eds.), Advances in Cryptology - CRYPTO ’97. Lecture Notes in Computer Science, vol. 1294 (Springer, Berlin, 1997), pp. 513–525

    Google Scholar 

  3. A. Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J. Robshaw, Y. Seurin, C. Vikkelsoe, PRESENT: an ultra-lightweight block cipher, in Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ’07 (Springer, Berlin, 2007), pp. 450–466

    MATH  Google Scholar 

  4. M. Cazorla, K. Marquet, M. Minier, Survey and benchmark of lightweight block ciphers for wireless sensor networks, in SECRYPT (2013), pp. 543–548

    Google Scholar 

  5. H. Chen, L. Fan, Integral based fault attack on LBlock, in ICISC (2014), pp. 227–240

    Google Scholar 

  6. H. Choukri, M. Tunstall, Round reduction using faults, in FDTC (2015), pp. 13–24

    Google Scholar 

  7. N.T. Courtois, J. Pieprzyk, Cryptanalysis of block ciphers with overdefined systems of equations, in Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), Queenstown, December 2002 (Springer, Berlin, 2002), pp. 267–287

    Google Scholar 

  8. N.T. Courtois, K. Jackson, D. Ware, Fault-algebraic attacks on inner rounds of des, in e-Smart’10 Proceedings: The Future of Digital Security Technologies (Strategies Telecom and Multimedia, Montreuil, 2010)

    Google Scholar 

  9. A. Dehbaoui, A.-P. Mirbaha, N. Moro, J.-M. Dutertre, A. Tria, Electromagnetic glitch on the AES round counter, in International Workshop on Constructive Side-Channel Analysis and Secure Design (Springer, Berlin, 2013), pp. 17–31

    Google Scholar 

  10. D. Dinu, Y. Le Corre, D. Khovratovich, L. Perrin, J. Großschädl, A. Biryukov, Triathlon of lightweight block ciphers for the internet of things. J. Cryptogr. Eng. 209, 1–20 (2015)

    Google Scholar 

  11. K. Jeong, C. Lee, J.I. Lim, Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2013(151), 1–9 (2013)

    Google Scholar 

  12. P. Jovanovic, M. Kreuzer, I. Polian, An algebraic fault attack on the LED block cipher. IACR Cryptol. ePrint Archive 2012, 400 (2012)

    MATH  Google Scholar 

  13. L. Knudsen, C. Miolane, Counting equations in algebraic attacks on block ciphers. Int. J. Inf. Secur. 9(2), 127–135 (2010)

    Article  Google Scholar 

  14. W. Li, J. Zhao, X. Zhao, J. Zhu, Algebraic fault analysis on LBlock under nibble-based fault model, in IMCCC (2013), pp. 1525–1529

    Google Scholar 

  15. NIST, Data encryption standard. Federal Information Processing Standards Publications, May 1977

    Google Scholar 

  16. B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson, Twofish: A 128-bit block cipher. NIST AES Proposal, 15 June 1998

    Google Scholar 

  17. F.-X. Standaert, T. Malkin, M. Yung, A unified framework for the analysis of side-channel key recovery attacks, in EUROCRYPT (2009), pp. 443–461

    Google Scholar 

  18. W. Wu, L. Zhang, LBlock: a lightweight block cipher, in ACNS (2011), pp. 327–344

    Google Scholar 

  19. F. Zhang, X. Zhao, S. Guo, T. Wang, Z. Shi, Improved algebraic fault analysis: a case study on piccolo and applications to other lightweight block ciphers, in Proceedings of the 4th International Workshop Constructive Side-Channel Analysis Secure Design (COSADE), Paris, March 2013 (Springer, Berlin, 2013), pp. 62–79

    Google Scholar 

  20. L. Zhao, T. Nishide, K. Sakurai, Differential fault analysis of full LBlock, in COSADE (2012), pp. 135–150

    Google Scholar 

  21. X. Zhao, S. Guo, F. Zhang, T. Wang, Z. Shi, K. Ji, Algebraic differential fault attacks on LED using a single fault injection, in IACR Cryptology ePrint Archive (2012)

    Google Scholar 

  22. X. Zhao, S. Guo, F. Zhang, Z. Shi, C. Ma, T. Wang, Improving and evaluating differential fault analysis on LED with algebraic techniques, in Proceedings of the 10th IEEE Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), Santa Barbara, August 2013 (IEEE, Los Alamitos, 2013), pp. 41–51

    Google Scholar 

  23. X. Zhao, S. Guo, F. Zhang, T. Wang, Z. Shi, D. Gu, C. Ma, Algebraic fault analysis on GOST for key recovery and reverse engineering, in FDTC (2014), pp. 29–39

    Google Scholar 

Download references

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China under the grants 61472357 and 61571063, the Zhejiang University Fundamental Research Funds for the Central Universities under the grant 2018QNA5005, the Open Fund of State Key Laboratory of Cryptology under the grand MMKFKT201805, the Alibaba-Zhejiang University Joint Institute of Frontier Technologies, the Major Scientific Research Project of Zhejiang Lab under the grant 2018FD0ZX01, and the European Commission through the ERC project 280141 (acronym CRASH).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fan Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Zhang, F. et al. (2019). An Automated Framework for Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers. In: Breier, J., Hou, X., Bhasin, S. (eds) Automated Methods in Cryptographic Fault Analysis. Springer, Cham. https://doi.org/10.1007/978-3-030-11333-9_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-11333-9_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-11332-2

  • Online ISBN: 978-3-030-11333-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics