Qian Wang, Liji Wu, Xiangmin Zhang, Xiangyu Li, Jun Guo
{"title":"银行IC卡中3DES密码引擎故障攻击的有效对策","authors":"Qian Wang, Liji Wu, Xiangmin Zhang, Xiangyu Li, Jun Guo","doi":"10.1109/CIS.2013.159","DOIUrl":null,"url":null,"abstract":"As bank IC cards with chips are widely used nowadays, the security of them becomes increasingly important. Fault attack, which aims to inject fault into the chip during the calculation, is a serious threat to the information security of the chip. Thus considerable countermeasures are involved to meet the overall requirements and facilitate the intended application for bank IC cards. In this paper, countermeasures against fault attacks for 3DES (Triple Data Encryption Algorithm) which is one of the widely used block ciphers in the bank IC cards are designed and implemented. Those countermeasures in our paper are based on the symmetry structure of DES block and we try to dig the efficiency in it. The basic countermeasure reduces the time latency from 100% to 1/n × 100% for n round block cipher. On the basis of this, an optimized countermeasure lowers the redundancy rate from 1/4 to 1/16. Another optimization reduces the area cost of duplication than the second method, which has the same latency. The countermeasures are designed for the 3DES algorithm in RTL level, implemented and verified in FPGA board. The fault attack platform successfully injected clock glitch into the DES engine and demonstrated the validity of the countermeasure. Over 1000 3DES calculations are tested and the successful detection rate is 100%.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"113 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Efficient Countermeasures against Fault Attacks for 3DES Crypto Engine in Bank IC Card\",\"authors\":\"Qian Wang, Liji Wu, Xiangmin Zhang, Xiangyu Li, Jun Guo\",\"doi\":\"10.1109/CIS.2013.159\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As bank IC cards with chips are widely used nowadays, the security of them becomes increasingly important. Fault attack, which aims to inject fault into the chip during the calculation, is a serious threat to the information security of the chip. Thus considerable countermeasures are involved to meet the overall requirements and facilitate the intended application for bank IC cards. In this paper, countermeasures against fault attacks for 3DES (Triple Data Encryption Algorithm) which is one of the widely used block ciphers in the bank IC cards are designed and implemented. Those countermeasures in our paper are based on the symmetry structure of DES block and we try to dig the efficiency in it. The basic countermeasure reduces the time latency from 100% to 1/n × 100% for n round block cipher. On the basis of this, an optimized countermeasure lowers the redundancy rate from 1/4 to 1/16. Another optimization reduces the area cost of duplication than the second method, which has the same latency. The countermeasures are designed for the 3DES algorithm in RTL level, implemented and verified in FPGA board. The fault attack platform successfully injected clock glitch into the DES engine and demonstrated the validity of the countermeasure. Over 1000 3DES calculations are tested and the successful detection rate is 100%.\",\"PeriodicalId\":294223,\"journal\":{\"name\":\"2013 Ninth International Conference on Computational Intelligence and Security\",\"volume\":\"113 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Ninth International Conference on Computational Intelligence and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIS.2013.159\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Ninth International Conference on Computational Intelligence and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.2013.159","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
摘要
随着芯片银行IC卡的广泛应用,其安全性变得越来越重要。故障攻击的目的是在计算过程中向芯片注入故障,是对芯片信息安全的严重威胁。因此,需要采取相当多的对策来满足总体要求并促进银行IC卡的预期应用。本文设计并实现了针对银行IC卡中应用最广泛的分组密码之一3DES (Triple Data Encryption Algorithm)的故障攻击对策。本文的对策都是基于DES块的对称结构,并试图挖掘其效率。基本对策将n轮分组密码的时间延迟从100%降低到1/n × 100%。在此基础上,优化对策将冗余率从1/4降低到1/16。另一种优化比第二种方法减少了重复的面积成本,后者具有相同的延迟。针对RTL级的3DES算法设计了相应的对策,并在FPGA板上进行了实现和验证。故障攻击平台成功地将时钟故障注入到DES引擎中,验证了对策的有效性。测试了1000多个3DES计算,成功检出率为100%。
Efficient Countermeasures against Fault Attacks for 3DES Crypto Engine in Bank IC Card
As bank IC cards with chips are widely used nowadays, the security of them becomes increasingly important. Fault attack, which aims to inject fault into the chip during the calculation, is a serious threat to the information security of the chip. Thus considerable countermeasures are involved to meet the overall requirements and facilitate the intended application for bank IC cards. In this paper, countermeasures against fault attacks for 3DES (Triple Data Encryption Algorithm) which is one of the widely used block ciphers in the bank IC cards are designed and implemented. Those countermeasures in our paper are based on the symmetry structure of DES block and we try to dig the efficiency in it. The basic countermeasure reduces the time latency from 100% to 1/n × 100% for n round block cipher. On the basis of this, an optimized countermeasure lowers the redundancy rate from 1/4 to 1/16. Another optimization reduces the area cost of duplication than the second method, which has the same latency. The countermeasures are designed for the 3DES algorithm in RTL level, implemented and verified in FPGA board. The fault attack platform successfully injected clock glitch into the DES engine and demonstrated the validity of the countermeasure. Over 1000 3DES calculations are tested and the successful detection rate is 100%.