18.11.2014 Views

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Our fault analysis capabilities allow the cryptanalyst to obtain another boolean<br />

equation by flipping the bit a t−1<br />

i and observing the new value assumed by a t i after the<br />

fault injection. So, at the end of this action, the cryptanalyst will have a simple system of<br />

the form:<br />

⎧⎪ ⎨ [a t i] before<br />

flipping = at−1 i−1 XOR ( )<br />

b OR a t−1<br />

i+1<br />

⎪ ⎩ [a t i] after<br />

flipping = at−1 i−1 XOR ( ) (2)<br />

b OR a t−1<br />

i+1<br />

where [a t i] before<br />

flipping and [at i] after<br />

flipping <strong>de</strong>note the values observed at cell at i before and after the<br />

fault injection, respectively. Before, the fault injection a t−1<br />

i = b and after this, a t−1<br />

i = b,<br />

where b is the complementary value of b. It is easy to find the solution for this system.<br />

The action performed is illustrated in figure 2.<br />

Bit to be flipped<br />

Flipped bit<br />

t 1<br />

a i 1<br />

x<br />

t<br />

<br />

a 1 i<br />

<br />

1<br />

<br />

b<br />

t<br />

a B i F<br />

t<br />

<br />

1<br />

a i<br />

<br />

1<br />

x<br />

t 1<br />

a i 1<br />

Fault Injection<br />

t 1<br />

a i 1<br />

x<br />

t<br />

<br />

a 1 i<br />

<br />

1<br />

<br />

b<br />

t<br />

a A i F<br />

t<br />

<br />

1<br />

a i<br />

<br />

1<br />

x<br />

t 1<br />

a i 1<br />

Observe modified<br />

value<br />

Figure 2. Illustration of the main i<strong>de</strong>a involved in the first step of our attack.<br />

Steps 2 and 3 are trivial, and we hardly have to perform a flip action, because,<br />

usually, we have equation with only one variable to be <strong>de</strong>termined. Figure 3 suggests<br />

that.<br />

Bit to be <strong>de</strong>termined<br />

t1<br />

a i 2<br />

x<br />

t<br />

<br />

a 1 i<br />

<br />

1<br />

t 1<br />

a i 1<br />

t1<br />

a i 2<br />

t<br />

ai<br />

1<br />

tt1<br />

a i i 1<br />

x<br />

t 1<br />

a i 1<br />

Known cells<br />

Figure 3. Illustration of step 3 configuration.<br />

Regarding the complexity of the attack, it is easy to obtain an estimation on the<br />

number of faults required to break the cryptosystem. At step 1, we provoke n/2 fault<br />

injections to <strong>de</strong>termine the two pairs of bits adjacent to the central column. At step 2,<br />

there are (1/2) × [(n/2) × (n/2)] bits, and, on average, we provoke 0.25 fault for each bit<br />

to be <strong>de</strong>termine. So, step 2 requires n 2 /32 faults. At step 3, as explained previously, no<br />

faults need to be realized. Thus,<br />

Number of Faults Rule30 = n2<br />

32 + n 2<br />

92

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!