Optimal Model Search for Hardware-Trojan-based Bit-Level Fault Attacks on Block Ciphers

Xinjie Zhao,Fan Zhang,Shize Guo,Zheng Gong
DOI: https://doi.org/10.1007/s11432-017-9179-4
2018-01-01
Science China Information Sciences
Abstract:Dear editor, Fault analysis is a very powerful technique used to break cryptographic inplementations.In particular,bit-level fault attacks (BLFAs),where one or a few isolated bits are flipped to inject faults,are among the imost efficient of the lot.Because it requires both precise fault injection and sophisticated key extraction,a BLFA is very difficult to conduct in practice.However,if the underlying cryptographic hardware is maliciously modified,a BLFA can be easily achieved.This recent security threat is popularly known as a hardware Trojan horse (HTH) [1].An HTH is a byproduct of the very popular and economically necessary outsourcing trend in the semiconductor industry.A well-designed HTH can precisely inject any type of bit-level fault.The corresponding attack is called a hardware-Trojan-based bit-level fault attack (HTH-BLFA).
What problem does this paper attempt to address?