Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/11074
Full metadata record
DC FieldValueLanguage
dc.contributor.authorJoshi, Priyankaen_US
dc.contributor.authorMazumdar, Bodhisatwaen_US
dc.date.accessioned2022-11-21T14:27:21Z-
dc.date.available2022-11-21T14:27:21Z-
dc.date.issued2022-
dc.identifier.citationJoshi, P., & Mazumdar, B. (2022). SPSA: Semi-permanent stuck-at fault analysis of AES rijndael SBox. Journal of Cryptographic Engineering, doi:10.1007/s13389-022-00301-1en_US
dc.identifier.issn2190-8508-
dc.identifier.otherEID(2-s2.0-85140852937)-
dc.identifier.urihttps://doi.org/10.1007/s13389-022-00301-1-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/11074-
dc.description.abstractFault attacks have gained particular attention in recent years as they present a severe threat to security in rapidly rising Internet-of-Things (IoT) devices. IoT devices generally are security-critical with resource constraints, such as small area footprint, low power, and memory consumption. Combinational circuit implementations of SBox are more efficient in terms of area, power, and memory requirements and, thus, preferable over look-up table implementation in these resource-constrained environments. In this work, we analyze an optimized combinatorial circuit implementation of AES SBox against a novel fault analysis technique, semi-permanent stuck-at (SPSA) fault analysis. We pinpoint SPSA hotspots in a combinational implementation of AES SBox that weaken the cryptographic properties of the SBox, leading to key recovery attacks. We present a key recovery attack based on improbable candidate elimination termed as SPSA attack. We observe that the hotspots can be categorized based on the method used for key recovery. The categories comprise hotspots vulnerable to direct key recovery, hotspots vulnerable against presented SPSA attacks, and hotspots vulnerable to other classical cryptanalysis techniques. Threshold implementation (TI) is among the widely adopted countermeasures to thwart power-based side-channel attacks. We evaluate a TI of AES SBox against the proposed SPSA fault analysis. In addition, we demonstrate the proposed attack on a low-latency cipher, PRINCE. Our work investigates new vulnerabilities against fault analysis in combinational circuit implementation. © 2022, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature.en_US
dc.language.isoenen_US
dc.publisherSpringer Science and Business Media Deutschland GmbHen_US
dc.sourceJournal of Cryptographic Engineeringen_US
dc.subjectInternet of thingsen_US
dc.subjectOptimizationen_US
dc.subjectRecoveryen_US
dc.subjectTable lookupen_US
dc.subjectTiming circuitsen_US
dc.subjectAESen_US
dc.subjectCircuit implementationen_US
dc.subjectFault analysisen_US
dc.subjectFaults attacksen_US
dc.subjectHotspotsen_US
dc.subjectLightweight ciphersen_US
dc.subjectPRINCEen_US
dc.subjectSemi permanentsen_US
dc.subjectStick-aten_US
dc.subjectStuck-at faultsen_US
dc.subjectSide channel attacken_US
dc.titleSPSA: Semi-Permanent Stuck-At fault analysis of AES Rijndael SBoxen_US
dc.typeJournal Articleen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: