Fault Attacks on Cryptosystems: Novel Threat Models, Countermeasures and Evaluation Metrics

Recent research has demonstrated that there is no sharp distinction between passive attacks based on side-channel leakage and active attacks based on fault injection. Fault behavior can be processed as side-channel information, offering all the benefits of Differential Power Analysis including noise...

Full description

Bibliographic Details
Main Author: Farhady Ghalaty, Nahid
Other Authors: Electrical and Computer Engineering
Format: Others
Published: Virginia Tech 2016
Subjects:
Online Access:http://hdl.handle.net/10919/72280
id ndltd-VTETD-oai-vtechworks.lib.vt.edu-10919-72280
record_format oai_dc
collection NDLTD
format Others
sources NDLTD
topic Hardware Security
Physical Attacks
Cryptography
spellingShingle Hardware Security
Physical Attacks
Cryptography
Farhady Ghalaty, Nahid
Fault Attacks on Cryptosystems: Novel Threat Models, Countermeasures and Evaluation Metrics
description Recent research has demonstrated that there is no sharp distinction between passive attacks based on side-channel leakage and active attacks based on fault injection. Fault behavior can be processed as side-channel information, offering all the benefits of Differential Power Analysis including noise averaging and hypothesis testing by correlation. In fault attacks, the adversary induces faults into a device while it is executing a known program and observes the reaction. The abnormal reactions of the device are later analyzed to obtain the secrets of the program under execution. Fault attacks are a powerful threat. They are used to break cryptosystems, Pay TVs, smart cards and other embedded applications. In fault attack resistant design, the fault is assumed to be induced by a smart, malicious, determined attacker who has high knowledge of the design under attack. Moreover, the purpose of fault attack resistant design is for the system to work correctly under intentional fault injection without leaking any secret data information. Towards building a fault attack resistant design, the problem can be categorized into three main subjects: begin{itemize} item Investigating novel and more powerful threat models and attack procedures. item Proposing countermeasures to build secure systems against fault attacks item Building evaluation metrics to measure the security of designs end{itemize} In this regard, my thesis has covered the first bullet, by proposing the Differential Fault Intensity Analysis (DFIA) based on the biased fault model. The biased fault model in this attack means the gradual behavior of the fault as a cause of increasing the intensity of fault injection. The DFIA attack has been successfully launched on AES, PRESENT and LED block ciphers. Our group has also recently proposed this attack on the AES algorithm running on a LEON3 processor. In our work, we also propose a countermeasure against one of the most powerful types of fault attacks, namely, Fault Sensitivity Analysis (FSA). This countermeasure is based on balancing the delay of the circuit to destroy the correlation of secret data and timing delay of a circuit. Additionally, we propose a framework for assessing the vulnerability of designs against fault attacks. An example of this framework is the Timing Violation Vulnerability Factor (TVVF) that is a metric for measuring the vulnerability of hardware against timing violation attacks. We compute TVVF for two implementations of AES algorithm and measure the vulnerability of these designs against two types of fault attacks. %For future work, we plan to propose an attack that is a combination of power measurements and fault injections. This attack is more powerful in the sense that it has less fault injection restrictions and requires less amount of information from the block cipher's data. We also plan to design more efficient and generic evaluation metrics than TVVF. As shown in this thesis, fault attacks are more serious threat than considered by the cryptography community. This thesis provides a deep understanding of the fault behavior in the circuit and therefore a better knowledge on powerful fault attacks. The techniques developed in this dissertation focus on different aspects of fault attacks on hardware architectures and microprocessors. Considering the proposed fault models, attacks, and evaluation metrics in this thesis, there is hope to develop robust and fault attack resistant microprocessors. We conclude this thesis by observing future areas and opportunities for research. === Ph. D.
author2 Electrical and Computer Engineering
author_facet Electrical and Computer Engineering
Farhady Ghalaty, Nahid
author Farhady Ghalaty, Nahid
author_sort Farhady Ghalaty, Nahid
title Fault Attacks on Cryptosystems: Novel Threat Models, Countermeasures and Evaluation Metrics
title_short Fault Attacks on Cryptosystems: Novel Threat Models, Countermeasures and Evaluation Metrics
title_full Fault Attacks on Cryptosystems: Novel Threat Models, Countermeasures and Evaluation Metrics
title_fullStr Fault Attacks on Cryptosystems: Novel Threat Models, Countermeasures and Evaluation Metrics
title_full_unstemmed Fault Attacks on Cryptosystems: Novel Threat Models, Countermeasures and Evaluation Metrics
title_sort fault attacks on cryptosystems: novel threat models, countermeasures and evaluation metrics
publisher Virginia Tech
publishDate 2016
url http://hdl.handle.net/10919/72280
work_keys_str_mv AT farhadyghalatynahid faultattacksoncryptosystemsnovelthreatmodelscountermeasuresandevaluationmetrics
_version_ 1719494227896827904
spelling ndltd-VTETD-oai-vtechworks.lib.vt.edu-10919-722802021-11-17T05:37:39Z Fault Attacks on Cryptosystems: Novel Threat Models, Countermeasures and Evaluation Metrics Farhady Ghalaty, Nahid Electrical and Computer Engineering Schaumont, Patrick R. Nazhandali, Leyla Abbott, A. Lynn Yao, Danfeng (Daphne) Yang, Yaling Wang, Chao Hardware Security Physical Attacks Cryptography Recent research has demonstrated that there is no sharp distinction between passive attacks based on side-channel leakage and active attacks based on fault injection. Fault behavior can be processed as side-channel information, offering all the benefits of Differential Power Analysis including noise averaging and hypothesis testing by correlation. In fault attacks, the adversary induces faults into a device while it is executing a known program and observes the reaction. The abnormal reactions of the device are later analyzed to obtain the secrets of the program under execution. Fault attacks are a powerful threat. They are used to break cryptosystems, Pay TVs, smart cards and other embedded applications. In fault attack resistant design, the fault is assumed to be induced by a smart, malicious, determined attacker who has high knowledge of the design under attack. Moreover, the purpose of fault attack resistant design is for the system to work correctly under intentional fault injection without leaking any secret data information. Towards building a fault attack resistant design, the problem can be categorized into three main subjects: begin{itemize} item Investigating novel and more powerful threat models and attack procedures. item Proposing countermeasures to build secure systems against fault attacks item Building evaluation metrics to measure the security of designs end{itemize} In this regard, my thesis has covered the first bullet, by proposing the Differential Fault Intensity Analysis (DFIA) based on the biased fault model. The biased fault model in this attack means the gradual behavior of the fault as a cause of increasing the intensity of fault injection. The DFIA attack has been successfully launched on AES, PRESENT and LED block ciphers. Our group has also recently proposed this attack on the AES algorithm running on a LEON3 processor. In our work, we also propose a countermeasure against one of the most powerful types of fault attacks, namely, Fault Sensitivity Analysis (FSA). This countermeasure is based on balancing the delay of the circuit to destroy the correlation of secret data and timing delay of a circuit. Additionally, we propose a framework for assessing the vulnerability of designs against fault attacks. An example of this framework is the Timing Violation Vulnerability Factor (TVVF) that is a metric for measuring the vulnerability of hardware against timing violation attacks. We compute TVVF for two implementations of AES algorithm and measure the vulnerability of these designs against two types of fault attacks. %For future work, we plan to propose an attack that is a combination of power measurements and fault injections. This attack is more powerful in the sense that it has less fault injection restrictions and requires less amount of information from the block cipher's data. We also plan to design more efficient and generic evaluation metrics than TVVF. As shown in this thesis, fault attacks are more serious threat than considered by the cryptography community. This thesis provides a deep understanding of the fault behavior in the circuit and therefore a better knowledge on powerful fault attacks. The techniques developed in this dissertation focus on different aspects of fault attacks on hardware architectures and microprocessors. Considering the proposed fault models, attacks, and evaluation metrics in this thesis, there is hope to develop robust and fault attack resistant microprocessors. We conclude this thesis by observing future areas and opportunities for research. Ph. D. 2016-08-20T08:00:19Z 2016-08-20T08:00:19Z 2016-08-19 Dissertation vt_gsexam:8762 http://hdl.handle.net/10919/72280 In Copyright http://rightsstatements.org/vocab/InC/1.0/ ETD application/pdf Virginia Tech