In this paper, we propose a novel fault attack termed as Single Event Transient Fault Analysis (SETFA) attack, which is well suited for hardware implementations. The proposed approach pinpoints hotspots in the cypher's Sbox combinational logic circuit that significantly reduce the key entropy when subjected to faults. ELEPHANT is a parallel authenticated encryption and associated data (AEAD) scheme targeted to hardware implementations, a finalist in the Lightweight cryptography (LWC) competition launched by NIST. In this work, we investigate vulnerabilities of ELEPHANT against fault analysis. We observe that the use of 128-bit random nonce makes it resistant against many cryptanalysis techniques like differential, linear, etc., and their variants. However, the relaxed nature of Statistical Fault Analysis (SFA) methods makes them widely applicable in restrictive environments. We propose a SETFA-based key recovery attack on Elephant. We performed Single experiments with random plaintexts and keys, on Dumbo, a Sponge-based instance of the Elephant-AEAD scheme. Our proposed approach could recover the secret key in 85-250 ciphertexts. In essence, this work investigates new vulnerabilities towards fault analysis that may require to be addressed to ensure secure computations and communications in IoT scenarios.
翻译:在本文中,我们提出了一个称为单一事件过错分析(SETFA)的新颖的过失攻击(AEAD)计划,称为单一事件过错分析(SETFA)攻击(SETFA),它非常适合硬件的实施。拟议的方法在密码器的Sbox 组合逻辑电路中点出了热点,在出现故障时会大大降低关键环球。ELEPHANT(AEAD)是针对硬件执行的平行的加密和相关数据(AEAD)计划,这是由NIST发起的轻量级加密(LWC)竞赛的决赛的决赛者。在这项工作中,我们研究了ELEPHANT(E)对错误分析的弱点。我们发现,使用128比随机的不规则使得它能够抵御多种密码分析技术(如差异、线性等)及其变异体。然而,统计包分析(SFADA)方法的宽松性使其广泛适用于限制性环境。我们建议对大象(LEITFATFA)进行基于简易加密密码和钥匙的回收攻击。我们在DBUBO(S-S-Spong-AEAD)中进行了一次实验。我们提议的海绵测测测到密码分析。我们提出的办法可能恢复了85号的密码分析。