Bypassing Parity Protected Cryptography using Laser Fault Injection in Cyber-Physical System

Lightweight cryptography has been widely utilized in resource constrained embedded devices of Cyber-Physical System (CPS) terminals. The hostile and unattended environment in many scenarios make those endpoints easy to be attacked by hardware based techniques. As a resourceefficient countermeasure a...

全面介紹

Saved in:
書目詳細資料
Main Authors: He, Wei, Breier, Jakub, Bhasin, Shivam, Chattopadhyay, Anupam
其他作者: School of Computer Engineering
格式: Conference or Workshop Item
語言:English
出版: 2016
主題:
在線閱讀:https://hdl.handle.net/10356/80681
http://hdl.handle.net/10220/40620
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
機構: Nanyang Technological University
語言: English
實物特徵
總結:Lightweight cryptography has been widely utilized in resource constrained embedded devices of Cyber-Physical System (CPS) terminals. The hostile and unattended environment in many scenarios make those endpoints easy to be attacked by hardware based techniques. As a resourceefficient countermeasure against Fault Attacks, parity Concurrent Error Detection (CED) is preferably integrated with security-critical algorithm in CPS terminals. The parity bit changes if an odd number of faults occur during the cipher execution. In this paper, we analyze the effectiveness of fault detection of a parity CED protected cipher (PRESENT) using laser fault injection. The experimental results show that the laser perturbation to encryption can easily flip an even number of data bits, where the faults cannot be detected by parity. Due to the similarity of different parity structures, our attack can bypass almost all parity protections in block ciphers. Some suggestions are given to enhance the security of parity implementations.