Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/14526
Full metadata record
DC FieldValueLanguage
dc.contributor.authorJoshi, Priyankaen_US
dc.contributor.authorMazumdar, Bodhisatwaen_US
dc.date.accessioned2024-10-08T11:06:18Z-
dc.date.available2024-10-08T11:06:18Z-
dc.date.issued2024-
dc.identifier.citationJoshi, P., & Mazumdar, B. (2024). Semi-Permanent Stuck-At Fault injection attacks on Elephant and GIFT lightweight ciphers. ACM Transactions on Design Automation of Electronic Systems. Scopus. https://doi.org/10.1145/3662734en_US
dc.identifier.issn1084-4309-
dc.identifier.otherEID(2-s2.0-85199314448)-
dc.identifier.urihttps://doi.org/10.1145/3662734-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/14526-
dc.description.abstractFault attacks pose a potent threat to modern cryptographic implementations, particularly those used in physically approachable embedded devices in IoT environments. Information security in such resource-constrained devices is ensured using lightweight ciphers, where combinational circuit implementations of SBox are preferable over look-up tables as they are more efficient regarding area, power, and memory requirements. Most existing fault analysis techniques focus on fault injection in memory cells and registers. Recently, a novel fault model and analysis technique, namely Semi-Permanent Stuck-At (SPSA) fault analysis, has been proposed to evaluate the security of ciphers with combinational circuit implementation of Substitution layer elements, SBox. In this work, we propose optimized techniques to recover the key in a minimum number of ciphertexts in such implementations of lightweight ciphers. Based on the proposed techniques, a key recovery attack on the NIST lightweight cryptography (NIST-LWC) standardization process finalist, Elephant AEAD, has been proposed. The proposed key recovery attack is validated on two versions of Elephant cipher. The proposed fault analysis approach recovered the secret key within 85-240 ciphertexts, calculated over 1,000 attack instances. To the best of our knowledge, this is the first work on fault analysis attacks on the Elephant scheme. Furthermore, an optimized combinational circuit implementation of Spongent SBox (SBox used in Elephant cipher) is proposed, having a smaller gate count than the optimized implementation reported in the literature. The proposed fault analysis techniques are validated on primary and optimized versions of Spongent SBox through Verilog simulations. Further, we pinpoint SPSA hotspots in the lightweight GIFT cipher SBox architecture. We observe that GIFT SBox exhibits resilience toward the proposed SPSA fault analysis technique under the single fault adversarial model. However, eight SPSA fault patterns reduce the nonlinearity of the SBox to zero, rendering it vulnerable to linear cryptanalysis. Conclusively, SPSA faults may adversely affect the cryptographic properties of an SBox, thereby leading to trivial key recovery. The GIFT cipher is used as an example to focus on two aspects: (i) its SBox construction is resilient to the proposed SPSA analysis and therefore characterizing such constructions for SPSA resilience and (ii) an SBox even though resilient to the proposed SPSA analysis, may exhibit vulnerabilities toward other classical analysis techniques when subjected to SPSA faults. Our work reports new vulnerabilities in fault analysis in the combinational circuit implementations of cryptographic protocols. Copyright © 2024 held by the owner/author(s). Publication rights licensed to ACM.en_US
dc.language.isoenen_US
dc.publisherAssociation for Computing Machineryen_US
dc.sourceACM Transactions on Design Automation of Electronic Systemsen_US
dc.subjectCombinational circuiten_US
dc.subjectElephant AEADen_US
dc.subjectFault attacksen_US
dc.subjectGIFT cipheren_US
dc.subjectLightweight ciphersen_US
dc.subjectSemi-permanent faultsen_US
dc.subjectStuck-at faultsen_US
dc.titleSemi-Permanent Stuck-At Fault injection attacks on Elephant and GIFT lightweight ciphersen_US
dc.typeJournal Articleen_US
dc.rights.licenseAll Open Access, Bronze-
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: