SCIENCE CHINA Information Sciences, Volume 61, Issue 3: 039106(2018) https://doi.org/10.1007/s11432-017-9179-4

Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers

More info
  • ReceivedApr 22, 2017
  • AcceptedJun 7, 2017
  • PublishedJan 5, 2018


There is no abstract available for this article.


This work was supported in part by National Natural Science Foundation of China (Grant Nos. 61309021, 61472357, 61571063, 61572028), China Scholarship Council (Grant No. 201606325012), and Project of Science and Technology of Guangdong Province (Grant Nos. 2014A030313439, 2016B010125002).


Appendix A.


[1] Bhunia S, Hsiao M, Banga M, et al. Hardware trojan attacks: threat analysis and countermeasures. Proc IEEE, 2014, 102: 1229--1247. Google Scholar

[2] Johnson A, Saha S, Chakraborty R, et al. Fault attack on AES via hardware Trojan insertion by dynamic partial reconfiguration of FPGA over ethernet. In: Proceedings of the 9th Workshop on Embedded Systems Security, New Delhi, 2014. 1--8. Google Scholar

[3] Biham E, Shamir A. Differential fault analysis of secret key cryptosystem. In: Proceedings of the 36th International Cryptology Conference. Berlin: Springer, 1997. 513--525. Google Scholar

[4] Bogdanov A, Knudsen L R, Leander G, et al. PRESENT: an ultra-lightweight block cipher. In: Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, Vienna, 2007. 450--466. Google Scholar

[5] Zhang F, Zhao X J, Guo S Z, et al. Improved algebraic fault analysis: a case study on piccolo and applications to other lightweight block ciphers. In: Proceedings of the 4th International Conference on Constructive Side-Channel Analysis and Secure Design, Paris, 2013. 62--79. Google Scholar

  • Figure 1

    (Color online) Optimal model search for an HTH-BLFA on PRESENT-80. (a) Faulty nibble number in each round ($A_i$); (b) determining the optimal injection round $I_o$ by $\theta_q$; (c) determining the optimal injection location $J_o$ ($I_o=28$); (d) statistics of $\phi(K)~(I_o=28,~J_o={0,1,2,3})$.

Copyright 2020 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1       京公网安备11010102003388号