Please use this identifier to cite or link to this item:
Title: Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers
Authors: He, Wei
Zhang, Fan
Zhao, Xinjie
Bhasin, Shivam
Guo, Shize
Keywords: Bit-level fault attacks
Hardware trojan
Issue Date: 2017
Source: Zhang, F., Zhao, X., He, W., Bhasin, S., & Guo, S. (2017). Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers. Science China Information Sciences, 60, 048102-.
Series/Report no.: Science China Information Sciences
Abstract: Fault analysis is a very powerful technique to break cryptographic implementations. In particular, bit-level fault analysis (BLFA), where faults are injected by flipping one or a few isolated bits, are among the most efficient of the lot. BLFA requires both precise fault injection capabilities and sophisticated key extraction skills. Algebraic fault analysis (AFA) is a good analysis technique for BLFA. Compared with differential fault analysis (DFA), AFA relies on the automation from machine solvers. Since it fully utilizes the leakages along propagation paths, it can extract the whole key when there is only one or a few bits infected, and when the injection is into the much deeper rounds. In practice, it is very difficult to inject precise bit-level faults and expensive equipments are indeed required. However, if the underlying cryptographic hardware is maliciously modified, BLFA can be easily achieved. This recent security threat is popularly known as Hardware trojan horse (HTH). HTH is a by-product of much popular and economically necessary outsourcing trend in semiconductors. A well designed HTH can precisely inject any type of faults to enable AFA and bypass detections, by having low cost and with low activation rate.
ISSN: 1674-733X
DOI: 10.1007/s11432-016-0233-0
Rights: © 2017 Science China Press and Springer-Verlag Berlin Heidelberg. This is the author created version of a work that has been peer reviewed and accepted for publication by Science China Information Sciences, Science China Press and Springer-Verlag Berlin Heidelberg. It incorporates referee’s comments but changes resulting from the publishing process, such as copyediting, structural formatting, may not be reflected in this document. The published version is available at: [].
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:TL Journal Articles

Files in This Item:
File Description SizeFormat 
scis_letter.pdf469.14 kBAdobe PDFThumbnail

Citations 50

Updated on Mar 24, 2023

Web of ScienceTM
Citations 50

Updated on Mar 23, 2023

Page view(s)

Updated on Mar 29, 2023

Download(s) 20

Updated on Mar 29, 2023

Google ScholarTM




Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.