Hardware Trojan on SIMON Architecture for Key Retrieval
Abstract
The need of an hour is the research on design and impacts of Hardware Trojan Horse in a crypto module to serve the purpose of secret key recovery. SIMON is a light weight block cipher that indulges to optimally work with hardware environment. Few papers have come up with the fault attack on SIMON cipher. In this paper, two bit toggle fault attack on 29\(^{th}\) round of the SIMON by intruding Hardware Trojan Horse is realized. The structural design of Hardware Trojan includes activation of two payloads with a single trigger. In consequence, the round key of SIMON cipher is retrieved by executing Differential Fault Analysis, using the fault free and completely faulty ciphertext. The power consumption of the SIMON design for both with and without Hardware Trojan is estimated using Simulation Activity Information File (.saif) on ZYNQ 7000 SoC family FPGA board and observed that there is minimal overhead of 1.32%. Provided, almost negligible difference of one LUT in area utilization is discerned. This infers that the insertion of designed HTH in the SIMON module have created an imperceptible impact and bypasses the testing process.
Keywords
Hardware Trojan Horse Block cipher SIMON cipher Fault attack Differential Fault AnalysisNotes
Acknowledgment
Its an immense pleasure for the authors to show their gratitude towards Interdisciplinary Cyber Physical Systems (ICPS) project, Department of Science and Technology (DST) for funding this research work under Project number: DST/ICPS/CPS-Individual/2018/819.
References
- 1.Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK families of lightweight block ciphers. Cryptology ePrint Archive, Report 2013/404 (2013). https://eprint.iacr.org/2013/404
- 2.Manivannan, S., Nalla Anandakumar, N., Nirmala Devi, M.: Key retrieval from AES architecture through hardware trojan horse. In: Thampi, S.M., Madria, S., Wang, G., Rawat, D.B., Alcaraz Calero, J.M. (eds.) SSCC 2018. CCIS, vol. 969, pp. 483–494. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-5826-5_37CrossRefGoogle Scholar
- 3.Takahashi, J., Fukunaga, T., Yamakoshi, K.: DFA mechanism on the AES key schedule. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2007), pp. 62–74, September 2007Google Scholar
- 4.Piret, G., Quisquater, J.-J.: A differential fault attack technique against SPN structures, with application to the AES and Khazad. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 77–88. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45238-6_7CrossRefzbMATHGoogle Scholar
- 5.Giraud, C., Thillard, A.: Piret and quisquater’s DFA on AES revisited (2010). http://eprint.iacr.org/2010/440. c.giraud@oberthur.com 14834 received 13 August 2010
- 6.Ali, S.S., Mukhopadhyay, D., Tunstall, M.: Differential fault analysis of AES: towards reaching its limits. J. Cryptographic Eng. 3(2), 73–97 (2013). https://doi.org/10.1007/s13389-012-0046-yCrossRefGoogle Scholar
- 7.Tupsamudre, H., Bisht, S., Mukhopadhyay, D.: Differential fault analysis on the families of SIMON and SPECK ciphers. In: Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 40–48, September 2014Google Scholar
- 8.Vasquez, J.d.C.G., Borges, F., Portugal, R., Lara, P.: An efficient one-bit model for differential fault analysis on SIMON family. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 61–70, September 2015Google Scholar
- 9.Kim, C.H.: Improved differential fault analysis on AES key schedule. IEEE Trans. Inf. Forensics Secur. 7(1), 41–50 (2012)CrossRefGoogle Scholar
- 10.Zhang, J., Wu, N., Zhou, F., Yahya, M., Li, J.: A novel differential fault is on the key schedule of SIMON family. Electronics 8, 93 (2019)CrossRefGoogle Scholar
- 11.Chen, H., Feng, J., Rijmen, V., Liu, Y., Fan, L., Li, W.: Improved fault analysis on SIMON block cipher family. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 16–24, August 2016Google Scholar
- 12.Krautter, J., Gnad, D., Tahoori, M.: FPGAhammer: remote voltage fault attacks on shared FPGAs, suitable for DFA on AES. IACR Trans. Cryptographic Hardware Embedded Syst. 2018(3), 44–68 (2018). https://tches.iacr.org/index.php/TCHES/article/view/7268Google Scholar