论文标题

用硬件特洛伊木马对AES核心的新颖篡改攻击

A Novel Tampering Attack on AES Cores with Hardware Trojans

论文作者

Jain, Ayush, Guin, Ujjwal

论文摘要

由于半导体制造和每个晶体管成本降低的进步,多年来,综合电路(IC)中加密原始的实施不断增加。硬件实现使加密操作更快,更节能。但是,已经提出了各种硬件攻击,旨在提取秘密钥匙,以破坏这些原语的安全性。在本文中,我们专注于广泛使用的高级加密标准(AES)块密码,并证明了其针对篡改攻击的脆弱性。我们提出的攻击依赖于不受信任的铸造厂将硬件特洛伊木马植入网表中,该铸造厂可以设计和实施特洛伊木马,因为它可以访问设计布局和遮罩信息。硬件特洛伊木马的激活通过防止所有前一轮键依赖性计算的效果来修改特定回合的输入数据。我们建议使用连续的硬件特洛伊木马在内部回合的输入中交付有效载荷,以实现此数据修改。所有内部子键,最后,一旦木马被激活,就可以从观察到的密文中计算秘密密钥。我们通过插入OpenCores基准套件的128位AES设计中的连续硬件Trojan实施了提议的篡改攻击,并报告了开销的区域,以证明拟议的篡改攻击的可行性。

The implementation of cryptographic primitives in integrated circuits (ICs) continues to increase over the years due to the recent advancement of semiconductor manufacturing and reduction of cost per transistors. The hardware implementation makes cryptographic operations faster and more energy-efficient. However, various hardware attacks have been proposed aiming to extract the secret key in order to undermine the security of these primitives. In this paper, we focus on the widely used advanced encryption standard (AES) block cipher and demonstrate its vulnerability against tampering attack. Our proposed attack relies on implanting a hardware Trojan in the netlist by an untrusted foundry, which can design and implement such a Trojan as it has access to the design layout and mask information. The hardware Trojan's activation modifies a particular round's input data by preventing the effect of all previous rounds' key-dependent computation. We propose to use a sequential hardware Trojan to deliver the payload at the input of an internal round for achieving this modification of data. All the internal subkeys, and finally, the secret key can be computed from the observed ciphertext once the Trojan is activated. We implement our proposed tampering attack with a sequential hardware Trojan inserted into a 128-bit AES design from OpenCores benchmark suite and report the area overhead to demonstrate the feasibility of the proposed tampering attack.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源