2019 IEEE 8th International Workshop on Advances in Sensors and Interfaces (IWASI) | 2019

On Misuse of Nonce-Misuse Resistance : Adapting Differential Fault Attacks on (few) CAESAR Winners

 
 
 

Abstract


New cryptographic schemes are often built upon old and proven primitives which withstood long public scrutiny. The recently concluded CAESAR competition saw several authenticated ciphers which were directly built upon proven primitives like AES. However, any attacks associated with these underlying primitives become a vulnerability to the whole scheme. AES, which is considered theoretically secure, has a very low fault resistance against differential fault attacks (DFA) requiring only 1-2 faults. In this paper, we study DFA attacks on some of the CAESAR competition winners with AES block cipher as the underlying primitive. We study the challenges imposed by the design of these modes, such as masking of the cipher-text. We also show that a very small number of nonce repetition and faults is required to extend the original attack on AES, which makes it very practical. We show that OCB and COLM need 1 nonce repetition and 3 faults only to uniquely identify the Key.

Volume None
Pages 189-193
DOI 10.1109/IWASI.2019.8791393
Language English
Journal 2019 IEEE 8th International Workshop on Advances in Sensors and Interfaces (IWASI)

Full Text