access icon free Key-leakage hardware Trojan with super concealment based on the fault injection for block cipher of SM4

In the security system, there is a lot of sensitive information, and the leakage of the secret key will cause security failure. In this Letter, combining the fault injection analysis of SM4 (Chinese block cipher algorithm standard), a key leakage Trojan payload circuit that requires only 4 XOR gates was designed and verified. By estimation, the area and power consumption is <1% of that in popular solutions. The scheme was successfully verified using FPGA. This Letter makes contribution to the defence for key-leakage type Trojan.

Inspec keywords: cryptography; invasive software; field programmable gate arrays

Other keywords: 4 XOR gates; sensitive information; security failure; SM4; secret key; super concealment; -leakage hardware Trojan; Letter; fault injection analysis; Chinese block cipher algorithm standard; key-leakage type Trojan; key leakage Trojan; information security system

Subjects: Digital circuit design, modelling and testing; Cryptography; Interpolation and function approximation (numerical analysis); Interpolation and function approximation (numerical analysis); Computer communications; Logic design methods; Data security; Cryptography theory

References

    1. 1)
      • 2. Fern, N., San, I., Koc, C.K., et al: ‘Hiding hardware Trojan communication channels in partially specified SoC bus functionality’, Trans. Comput.-Aided Des. Integr. Circuits Syst., 2016, PP, (99), pp. 11.
    2. 2)
      • 3. Xie, F., Li, X., Zhang, Y., et al: ‘Hardware Trojan design based on RS232 protocol time slot’, Sci. Technol. Eng., 2013, 13, (28), pp. 82848287. 6–4.
    3. 3)
      • 6. Li, W., Gu, D.: ‘An improved method of differential fault analysis on the SM4 cryptosystem’. Int. Symp. Data, Privacy, and E-Commerce, Chengdu, Sichuan, China, November 2007, pp. 175180.
    4. 4)
      • 5. Zhe, H.: ‘Design and detection of hardware Trojan circuits’. Master degree thesis, School of Electronic and Information Engineering, South China University of Technology, June 2016.
    5. 5)
      • 4. Lin, L., Kasper, M., Güneysu, T., et al: ‘Trojan side-channels: lightweight hardware Trojans through side-channel engineering’. Int. Workshop on Cryptographic Hardware and Embedded Systems, Lausanne, Switzerland, September 2009, pp. 382395.
    6. 6)
      • 1. Office of State Commercial Cryptography Administrator: ‘The SM4 cryptographic algorithm for WLAN products’. Available at http://www.oscca.gov.cn/UpFile/200621016423197990.pdf.
http://iet.metastore.ingenta.com/content/journals/10.1049/el.2018.1153
Loading

Related content

content/journals/10.1049/el.2018.1153
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading