# Fault Injection to Reverse Engineer DES-Like Cryptosystems

Abstract : Security is a key component for information technologies and communication and is mainly provided by cryptosystems. Although Kerckhoffs' principle enunciates that such cryptosystems should be secure even if their algorithms are public knowledge, private algorithms are still used. As the secrecy of such private algorithms ensures a large part of the security of the whole system, some attacks, called reverse-engineering'', aim at recovering these algorithms and/or details of their implementations. Among technics used to perform such attacks, a really efficient and powerful one, called “pertubation attacks”, consists in disrupting the circuit's behavior in order to alter the correct progress of the algorithm. Our work applies such technic to recover part of a crypto-algorithm based on the DES (for Data Encryption Standard) but which only differs from the values of its substitution boxes (or Sboxes).In the first part of the talk, the different technics of fault attacks will be shortly described. Then, our working hypothesis and our attack will be detailed. Next, the result obtained on simulated experiments will be presented. We’ll show that, with our approach, about two hundred of faulty executions of the algorithm enable to retrieve all the Sboxes. Compared with state of the art reverse engineering attacks based on faults, this number is reduced by a factor two.
Keywords :
Document type :
Conference papers
Domain :

https://hal-cea.archives-ouvertes.fr/cea-01094248
Contributor : Bruno Robisson <>
Submitted on : Thursday, December 11, 2014 - 10:26:39 PM
Last modification on : Monday, October 19, 2020 - 11:59:15 AM

### Identifiers

• HAL Id : cea-01094248, version 1

### Citation

Hélène Le Bouder, Sylvain Guilley, Bruno Robisson, Assia Tria. Fault Injection to Reverse Engineer DES-Like Cryptosystems. Chip to cloud security forum, Sep 2013, Nice, France. ⟨cea-01094248⟩

Record views