Abstract
We demonstrate two fault based key recovery attacks – a bit-flipping fault attack, and a random fault attack, on the authenticated encryption stream cipher TRIAD. The attacks discussed in this paper are applicable mainly due to the simplicity of the TRIAD keystream function during the first few hundred rounds. We investigated the algebraic normal form (ANF) of the first 160 output keystream bits of TRIAD. The ANF of these output keystream bits shows specific patterns that are used in our fault attacks. We first use these patterns with a bit-flipping fault model combined with solving a system of low degree algebraic equations that requires 85 faults to recover the secret key of TRIAD, with a data complexity of \(2^{7.43}\). We then relax our assumptions by using a random fault model. The random fault model described in this paper is also combined with solving a system of low degree algebraic equations and requires on average 170 faults to recover the secret key of TRIAD with a data complexity of \(2^{8.01}\). For both of the attacks, the complexity of solving the low degree algebraic equations is negligible. We have not performed experiments on the actual hardware implementation, but we have verified all the attacks using simulation on TRIAD software implementation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
NIST Lightweight Cryptography Project (2019). https://csrc.nist.gov/projects/lightweight-cryptography
Banik, S., Isobe, T., Meier, W., Todo, Y., Zhang, B.: TRIAD v1 - A Lightweight AEAD and Hash Function based on Stream Cipher, NIST Lightweight Cryptography (LWC) Project (2019). https://csrc.nist.gov/CSRC/media/Projects/Lightweight-Cryptography/documents/round-1/spec-doc/TRIAD-spec.pdf
De Cannière, C., Preneel, B.: Trivium: A stream cipher construction inspired by block cipher design principles. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) Information Security - ISC 2006, LNCS, vol. 4176, pp. 171–186. Springer, Heidelberg (2006). https://doi.org/10.1007/11836810_13
eSTREAM: the ECRYPT Stream Cipher Project. https://www.ecrypt.eu.org/stream/. Accessed 11 Sep 2020
He, Y., Wang, G., Li, W., Ren, Y.: Improved cube attacks on some authenticated encryption ciphers and stream ciphers in the Internet of Things. IEEE Access 8, 20920–20930 (2020). https://doi.org/10.1109/ACCESS.2020.2967070
Kesarwani, A., Sarkar, S., Venkateswarlu, A.: Some cryptanalytic results on TRIAD. In: Hao, F., Ruj, S., Sen Gupta, S. (eds.) Progress in Cryptology - INDOCRYPT 2019, LNCS, vol. 11898, pp. 160–174. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-35423-7_8
Schmidt, J., Herbst, C.: A practical fault attack on square and multiply. In: 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 53–58. IEEE, Washington, DC (2008). https://doi.org/10.1109/FDTC.2008.10
Hutter, M., Schmidt, J.: The temperature side channel and heating fault attacks. In: Francillon, A., Rohatgi, P. (eds.) Smart Card Research and Advanced Applications - CARDIS 2013, LNCS, vol. 8419, pp. 219–235. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-08302-5_15
Amiel, F., Clavier, C., Tunstall, M.: Fault analysis of DPA-resistant algorithms. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, JP. (eds.) Fault Diagnosis and Tolerance in Cryptography - FDTC 2006, LNCS, vol. 4236, pp. 223–236. Springer, Heidelberg (2006). https://doi.org/10.1007/11889700_20
Barenghi, A., Breveglieri, L., Koren, I., Naccache, D.: Fault injection attacks on cryptographic devices: theory, practice, and countermeasures. Proc. IEEE 100(11), 3056–3076 (2012). https://doi.org/10.1109/JPROC.2012.2188769
Skorobogatov, S.P., Anderson, R.J.: Optical fault induction attacks. In: Kaliski, B.S., Koç, K., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2002, LNCS, vol. 2523, pp. 2–12, Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36400-5_2
Selmke, B., Heyszl, J., Sigl, G.: Attack on a DFA protected AES by simultaneous laser fault injections. In: 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 36–46. IEEE, Santa Barbara (2016). https://doi.org/10.1109/FDTC.2016.16
Trichina, E., Korkikyan, R.: Multi fault laser attacks on protected CRT-RSA. In: 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 75–86. IEEE, Santa Barbara (2010). https://doi.org/10.1109/FDTC.2010.14
Dey, P., Rohit, R.S., Sarkar, S., Adhikari, A.: Differential fault analysis on Tiaoxin and AEGIS family of ciphers. In: Mueller, P., Thampi, S., Alam, B.M., Ko R., Doss, R., Alcaraz, C.J. (eds.) Security in Computing and Communications - SSCC 2016, CCIS, vol. 625, pp. 74–86, Springer, Singapore (2016). https://doi.org/10.1007/978-981-10-2738-3_7
Salam, I., Mahri, H.A., Simpson, L., Bartlett, H., Dawson, E., Wong, K.K.: Fault attacks on Tiaoxin-346. In: Proceedings of the the Australasian Computer Science Week - ASCW 2018, pp. 1–9. ACM Digital Library, New York (2018). https://doi.org/10.1145/3167918.3167940
Bartlett, H., Dawson, E., Mahri, H.A., Salam, M.I., Simpson, L., Wong, K.K-H.: Random fault attacks on a class of stream ciphers, security and communication networks, vol. 2019, Article ID 1680263, 12 pages (2019). https://doi.org/10.1155/2019/1680263
The Sage Developers. SageMath, The Sage Mathematics Software System (Version 9.0) (2020). https://www.sagemath.org
Buchberger, B.: Gröbner-bases: an algorithmic method in polynomial ideal theory. In: Bose, N.K. (ed.) Multidimensional Systems Theory, pp. 184–232. Reidel Publishing Company, Dodrecht (1985)
Acknowledgements
This research is supported by Xiamen University Malaysia Research Fund (Grant No: XMUMRF/2019-C3/IECE/0005).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Salam, I., Law, K.Y., Xue, L., Yau, WC. (2021). Differential Fault Based Key Recovery Attacks on TRIAD. In: Hong, D. (eds) Information Security and Cryptology – ICISC 2020. ICISC 2020. Lecture Notes in Computer Science(), vol 12593. Springer, Cham. https://doi.org/10.1007/978-3-030-68890-5_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-68890-5_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-68889-9
Online ISBN: 978-3-030-68890-5
eBook Packages: Computer ScienceComputer Science (R0)