Font Size: a A A

Research And Implementation Of Key Technologies Of Lightweight Encryption Algorithm Fault Attack

Posted on:2023-12-02Degree:DoctorType:Dissertation
Country:ChinaCandidate:L DongFull Text:PDF
GTID:1528306914978089Subject:Electronic Science and Technology
Abstract/Summary:PDF Full Text Request
With the explosive development of information technology,people’s lives have entered the era of wireless mobile internet.While people are immersed in the convenience of mobile terminals and the Internet,they are also subject to malicious attacks such as phishing websites,malicious Apps,botnets,and intruded smart terminal hardwares that continuously steal private data from enterprises and individuals.Therefore,cyberspace security has attracted more and more attention.As the basic carrier of digital information,the chip plays a pivotal role in the security of cyberspace.In order to prevent the chip from being injected into faults and causing the leakage of data information,the security of the data is generally protected by running an encryption algorithm in the chip.The lightweight encryption algorithm occupies less space and consumes less energy in the chip,and is widely used in smart hardware terminals.Although the lightweight encryption algorithm can protect data security to a certain extent,the encryption algorithm will also be cracked under certain fault attacks.Lightweight encryption algorithms are subjected to various evaluations to meet robustness requirements.In terms of analysis,an analysis method of impossible algebraic attack is designed by analyzing the basic principles of algebraic fault attack and impossible differential fault analysis.In terms of fault injection analysis model,this paper analyses the method of multiple random faults,and verifies the effectiveness of the method through hardware experiments and simulation experiments.In terms of hardware fault injection of encryption algorithm,this paper designs an experimental system of laser fault injection,and designs a non-intrusive fault analysis system that integrates clock fault injection,voltage jitter fault injection,and high temperature fault injection.The main contributions of the paper are as follows:(1)In terms of the principle of fault attack analysis,this paper combines impossible fault analysis with algebraic difference analysis,and proposes an impossible difference algebraic analysis method.Through the differential propagation path,all impossible faults are eliminated,and then by analyzing the internal properties of the algorithm,an algebraic differential equation is established to further reduce the key space.The designed random redundant fault analysis model is used to attack the LED encryption algorithm,and the impossible differential algebra analysis is applied to the attack analysis.The experiment verifies the effectiveness of the analysis method,and it only needs no more than 6 fault injections to recover the key.The random redundant fault injection model can effectively compensate for the fact that there may be redundant faults in the actual fault injection process,which will have important significance for the block cipher in the fault analysis model.(2)In terms of fault injection model,a mathematical analysis model of random multiple faults is designed.In the Midori encryption algorithm,the fault analysis model can realize up to 6 nibbles of fault analysis.In this paper,through computer simulation,the relationship between the fault attack of Midori encryption algorithm and the amount of key information leakage is obtained.Through mathematical fitting,the function relationship between fault injection applicable to the algorithm and the amount of key information is obtained.This method provides a theoretical basis for obtaining the secret key quickly.The random multiple fault analysis model improves the efficiency of fault analysis,which helps to improve the security of the lightweight encryption systems.(3)In the experimental of laser fault injection,a hardware test platform for laser fault injection is designed.The operating status of the microcontroller is read through the FPGA circuit.When the fault injection time arrived,the FPGA circuit triggers the laser output pulse to inject the laser fault in the 14th round of Midori.According to the fact that the random fault injection Midori encryption algorithm has an obvious differential structure,an optimized differential attack method is designed.After laser fault injection,using the optimized differential attack method for analysis,the fault can be analyzed in the average time of 0.0542 seconds,which is the shortest time-consuming analysis of Midori currently known.(4)In terms of the hardware experiment of non-intrusive fault injection,a non-intrusive fault attack hardware platform integrating clock jitter fault injection,voltage glitch fault injection,and high temperature fault injection is designed,which can achieve a combination of three types of fault injection attacks.The fusion fault injection platform can achieve 1-bit fault injection and multiple-nibbles fault injections.The platform verifies the effectiveness of the attack analysis method proposed in this paper,and illustrates the practical significance of multiple faults injection in actual fault analysis.Voltage glitch fault injection and clock jitter fault injection need to find suitable fault sensitive points.Through actual verification,this paper gives a method to quickly find fault sensitive points.In the multiple faults injection,there is a case in which faults are injected in multiple rounds.Based on the Midori lightweight encryption algorithm,the stage jitter fault attack model is analysized,and the differential attack is applied to theoretically analyze the stage jitter fault attack model.This model expands the scope of the original single random fault analysis.
Keywords/Search Tags:clock jitter attack, voltage fault attack, laser fault attack, differential fault attack, random multi-fault analysis model
PDF Full Text Request
Related items