Netinfo Security ›› 2023, Vol. 23 ›› Issue (5): 41-49.doi: 10.3969/j.issn.1671-1122.2023.05.005

Previous Articles     Next Articles

Multiple Persistent Faults Analysis with Unknown Faults

MAO Hongjing1,2, CHENG Yukun1,2, HU Honggang1,2()   

  1. 1. Key Laboratory of Electromagnetic Space Information, Chinese Academy of Science, Hefei 230027, China
    2. School of Cyber Science, University of Science and Technology of China, Hefei 230027, China
  • Received:2023-03-01 Online:2023-05-10 Published:2023-05-15
  • Contact: HU Honggang E-mail:hghu2005@ustc.edu.cn

Abstract:

Persistent Fault Analysis (PFA) is a novel fault analysis technique proposed in 2018, which has attracted widespread attention from home and abroad. Although various analysis methods for different cryptographic systems have been proposed, research on the fault model with unknown fault values is still an open problem, which represents a more practical attack scenario. Particularly when dealing with multiple faults, it is more difficult to control the overlap of the original and faulty values. This paper proposed a multiple persistent fault analysis model under a relatively loose fault model. Attackers did not need to know any information about fault values, locations, or even number. By exploiting the property that persistent faults remained unchanged during all encryption processes, the range of fault values was narrowed down using the results of different bytes of ciphertext, eventually leading to key recovery. Both theoretical proof and simulation experiments were conducted to verify the effectiveness of the analysis model. Taking the AES-128 algorithm as an example, with only 150 ciphertexts under the condition of ciphertext-only, the number of candidate keys can be controlled within a small range. The success rate of the attack is above 99%, effectively reduce the required number of ciphertexts. By increasing the number of rounds, the key can be recovered even after frequent key-update, significantly reducing the difficulty of the attack.

Key words: persistent faults analysis, side-channel attacks, AES algorithm, fault injection attacks

CLC Number: