Cryptography Reference
In-Depth Information
Table 1. The number of faults and messages to recover the secret key in our fault
attacks on G
Big Field ( § 3.2.1)
STS ( § 3.2.2)
#Fault
1
n − 1
1
2
#( x, δ )
( n +1)( n +2)
1
Recovering
parts of S, T
apartof T
where c is a constant. This means that δ (1) =( δ (1 1 ,
(1 m ) t
···
coincides with a
,t ml 1 ) t in T 1 .Thus,taking
constant multiple of the l 1 -thcolumnvector( t 1 l 1 ,
···
the transform
l ˇ
1
0
∗∗
−δ (1 2 (1)
. . .
0
0
1
T (1) :=
T (1) T 1 =
I m− 1
,
we have
.
(15)
.
−δ (1 m (1)
1
Next, cause another fault on G , and get a pair ( x (2) (2) ) by Step 1-4 with
( G ) = G ,namely, x (2) := S 1 ( G 1 ( T 1 ( y (2) ))), δ (2) := F ( x (2) )
F ( x (2) ).
Assume that the fault changes the coecient a ( l 2 )
i 2 j 2
to ( a ( l 2 )
i 2 j 2
) .Thenweseethat
S ( x (2) )= T 1 (0 ,
, 0) t ,
, 0 , l
, 0 , l
δ (2) = T 1
G )
( G
···
c 2 , 0 ,
···
c 1 , 0 ,
···
where c 1 and c 2 are constants. Then, similar to (15), the attacker can reduce the
elements in the l 2 -thcolumnin T 1 .
Repeating such processes n
1 times, one can reduce T 1 to a permutation of
a triangle matrix. Recall that the purpose of the rank attack is to find (a part
of) T . Thus the fault attack reduces the parameters in T to be found by the
rank attack.
Table 1 shows a comparison of the fault attack results against the Big Field
type in section 3.2.1 and the STS type in section 3.2.2. #Fault is the number of
faults required for the attack and #( x, δ ) is the number of pairs ( x ( l ) ( l ) )given
in Step 4 for each fault . The proposed fault attack can recover parts of the secret
keys S and T for the Big Field type and a part of T in equation (2) for the STS
type, respectively.
3.2.3 Success Probability and Distinguishing the Faulty Place
Our fault attacks on G succeed if the fault changes a parameter in G . However,
there are fixed system parameters other than G ,whicharein S and T .Ifthe
fault changes entries in S or T , our fault attack fails to recover the desired secret
information. In this subsection, we discuss the probability that a parameter in
G is changed by a random fault, and how to distinguish which map ( G , S or T )
is faulty.
Success probability. Thenumbersoftheentries(over k )in S and T are
n ( n +1) and m ( m + 1) respectively, and the total number of the coecients
 
Search WWH ::




Custom Search