Advertisement

Hardware Trojan on SIMON Architecture for Key Retrieval

  • Sivappriya ManivannanEmail author
  • K. K. Soundra PandianEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1116)

Abstract

The need of an hour is the research on design and impacts of Hardware Trojan Horse in a crypto module to serve the purpose of secret key recovery. SIMON is a light weight block cipher that indulges to optimally work with hardware environment. Few papers have come up with the fault attack on SIMON cipher. In this paper, two bit toggle fault attack on 29\(^{th}\) round of the SIMON by intruding Hardware Trojan Horse is realized. The structural design of Hardware Trojan includes activation of two payloads with a single trigger. In consequence, the round key of SIMON cipher is retrieved by executing Differential Fault Analysis, using the fault free and completely faulty ciphertext. The power consumption of the SIMON design for both with and without Hardware Trojan is estimated using Simulation Activity Information File (.saif) on ZYNQ 7000 SoC family FPGA board and observed that there is minimal overhead of 1.32%. Provided, almost negligible difference of one LUT in area utilization is discerned. This infers that the insertion of designed HTH in the SIMON module have created an imperceptible impact and bypasses the testing process.

Keywords

Hardware Trojan Horse Block cipher SIMON cipher Fault attack Differential Fault Analysis 

Notes

Acknowledgment

Its an immense pleasure for the authors to show their gratitude towards Interdisciplinary Cyber Physical Systems (ICPS) project, Department of Science and Technology (DST) for funding this research work under Project number: DST/ICPS/CPS-Individual/2018/819.

References

  1. 1.
    Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK families of lightweight block ciphers. Cryptology ePrint Archive, Report 2013/404 (2013). https://eprint.iacr.org/2013/404
  2. 2.
    Manivannan, S., Nalla Anandakumar, N., Nirmala Devi, M.: Key retrieval from AES architecture through hardware trojan horse. In: Thampi, S.M., Madria, S., Wang, G., Rawat, D.B., Alcaraz Calero, J.M. (eds.) SSCC 2018. CCIS, vol. 969, pp. 483–494. Springer, Singapore (2019).  https://doi.org/10.1007/978-981-13-5826-5_37CrossRefGoogle Scholar
  3. 3.
    Takahashi, J., Fukunaga, T., Yamakoshi, K.: DFA mechanism on the AES key schedule. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2007), pp. 62–74, September 2007Google Scholar
  4. 4.
    Piret, G., Quisquater, J.-J.: A differential fault attack technique against SPN structures, with application to the AES and Khazad. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 77–88. Springer, Heidelberg (2003).  https://doi.org/10.1007/978-3-540-45238-6_7CrossRefzbMATHGoogle Scholar
  5. 5.
    Giraud, C., Thillard, A.: Piret and quisquater’s DFA on AES revisited (2010). http://eprint.iacr.org/2010/440. c.giraud@oberthur.com 14834 received 13 August 2010
  6. 6.
    Ali, S.S., Mukhopadhyay, D., Tunstall, M.: Differential fault analysis of AES: towards reaching its limits. J. Cryptographic Eng. 3(2), 73–97 (2013).  https://doi.org/10.1007/s13389-012-0046-yCrossRefGoogle Scholar
  7. 7.
    Tupsamudre, H., Bisht, S., Mukhopadhyay, D.: Differential fault analysis on the families of SIMON and SPECK ciphers. In: Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 40–48, September 2014Google Scholar
  8. 8.
    Vasquez, J.d.C.G., Borges, F., Portugal, R., Lara, P.: An efficient one-bit model for differential fault analysis on SIMON family. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 61–70, September 2015Google Scholar
  9. 9.
    Kim, C.H.: Improved differential fault analysis on AES key schedule. IEEE Trans. Inf. Forensics Secur. 7(1), 41–50 (2012)CrossRefGoogle Scholar
  10. 10.
    Zhang, J., Wu, N., Zhou, F., Yahya, M., Li, J.: A novel differential fault is on the key schedule of SIMON family. Electronics 8, 93 (2019)CrossRefGoogle Scholar
  11. 11.
    Chen, H., Feng, J., Rijmen, V., Liu, Y., Fan, L., Li, W.: Improved fault analysis on SIMON block cipher family. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 16–24, August 2016Google Scholar
  12. 12.
    Krautter, J., Gnad, D., Tahoori, M.: FPGAhammer: remote voltage fault attacks on shared FPGAs, suitable for DFA on AES. IACR Trans. Cryptographic Hardware Embedded Syst. 2018(3), 44–68 (2018). https://tches.iacr.org/index.php/TCHES/article/view/7268Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of Electronics and Communication EngineeringPDPM-Indian Institute of Information Technology, Design and ManufacturingJabalpurIndia
  2. 2.Controller of Certifying Authorities, Ministry of Electronics and Information TechnologyGovernment of IndiaNew DelhiIndia

Personalised recommendations