eprint.iacr.org will be offline for approximately an hour for routine maintenance at 11pm UTC on Tuesday, April 16. We lost some data between April 12 and April 14, and some authors have been notified that they need to resubmit their papers.

Paper 2018/545

Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers

Xiaolu Hou, Jakub Breier, Fuyuan Zhang, and Yang Liu

Abstract

Differential Fault Analysis (DFA) is considered as the most popular fault analysis method. While there are techniques that provide a fault analysis automation on the cipher level to some degree, it can be shown that when it comes to software implementations, there are new vulnerabilities, which cannot be found by observing the cipher design specification. This work bridges the gap by providing a fully automated way to carry out DFA on assembly implementations of symmetric block ciphers. We use a customized data flow graph to represent the program and develop a novel fault analysis methodology to capture the program behavior under faults. We establish an effective description of DFA as constraints that are passed to an SMT solver. We create a tool that takes assembly code as input, analyzes the dependencies among instructions, automatically attacks vulnerable instructions using SMT solver and outputs the attack details that recover the last round key (and possibly the earlier keys). We support our design with evaluations on lightweight ciphers SIMON, SPECK, and PRIDE, and a current NIST standard, AES. By automated assembly analysis, we were able to find new efficient DFA attacks on SPECK and PRIDE, exploiting implementation specific vulnerabilities, and previously published DFA on SIMON and AES. Moreover, we present a novel DFA on multiplication operation that has never been shown for symmetric block ciphers before. Our experimental evaluation also shows reasonable execution times that are scalable to current cipher designs and can easily outclass the manual analysis. Moreover, we present a method to check the countermeasure-protected implementations in a way that helps implementers to decide how many rounds should be protected. We note that this is the first work that automatically carries out DFA on cipher implementations without any plaintext or ciphertext information and therefore, can be generally applied to any input data to the cipher.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published by the IACR in TCHES 2019
Keywords
differential fault analysiscryptographic fault attacksautomationassembly
Contact author(s)
jbreier @ jbreier com
History
2019-04-15: last of 2 revisions
2018-06-04: received
See all versions
Short URL
https://ia.cr/2018/545
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2018/545,
      author = {Xiaolu Hou and Jakub Breier and Fuyuan Zhang and Yang Liu},
      title = {Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers},
      howpublished = {Cryptology ePrint Archive, Paper 2018/545},
      year = {2018},
      note = {\url{https://eprint.iacr.org/2018/545}},
      url = {https://eprint.iacr.org/2018/545}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.