DocumentCode :
3398629
Title :
Reverse Engineering of a Secret AES-like Cipher by Ineffective Fault Analysis
Author :
Clavier, Christophe ; Wurcker, Antoine
Author_Institution :
XLIM, Univ. of Limoges, Limoges, France
fYear :
2013
fDate :
20-20 Aug. 2013
Firstpage :
119
Lastpage :
128
Abstract :
In this paper we investigate the problem of reverse engineering the specifications of a secret AES-like block cipher defined by a set of non-standard parameters. We allow the designer to modify all parameters of an AES (S-Box table, SR constants, MC coefficients as well as the RW and the RC values) provided that the SPN structure and sizes are preserved. We propose a chosen plaintext FIRE attack based on ineffective fault analysis (IFA) in the "byte stuck at 0" fault model. We describe a step-by-step procedure that recovers the AES-like secret parameters without requiring the knowledge of the encryption key. The soundness and the efficiency of each step is evaluated by simulations. As our attack assumes that no classical countermeasure against side-channel and fault analysis is implemented, it intends to demonstrate that protecting the implementation of such AES-like function is not a facultative option even if its specifications are not public.
Keywords :
cryptography; embedded systems; fault diagnosis; reverse engineering; AES-like secret parameters; IFA; SPN structure; encryption key; ineffective fault analysis; nonstandard parameters; plaintext FIRE attack; reverse engineering; secret AES-like block cipher; Ciphers; Encryption; Equations; Fires; Reverse engineering; Standards; AES; Embedded devices; FIRE; Ineffective Fault Analysis; reverse engineering;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Fault Diagnosis and Tolerance in Cryptography (FDTC), 2013 Workshop on
Conference_Location :
Santa Barbara, CA
Print_ISBN :
978-0-7695-5059-6
Type :
conf
DOI :
10.1109/FDTC.2013.16
Filename :
6623562
Link To Document :
بازگشت