CryptoCell CC310. This vulnerability affects ECB, CBC, and CTR modes and undermines data
confidentiality. Although Differential Fault Analysis (DFA) does not yield key extraction in ECB
mode, plaintext recovery is achieved consistently with voltage fault injection in ECB, CBC, and
CTR modes. Additionally, various error byte diffusion patterns, such as all-zeroes output and
partial error byte diffusion, were observed under specific fault conditions.
4.2 Technical Analysis
• Root Cause: The AES hardware engine lacks adequate protection against fault injection,
leading to corrupted encryption outputs that permit plaintext leakage.
• Hardware-Based Fault Injection Technique: A custom voltage glitching tool with a
MOSFET crowbar circuit introduces voltage faults during the encryption process. The
setup does not require the removal of capacitors.
• Fault Patterns Observed: Voltage fault injection produces multiple fault patterns,
including:
o Plaintext output: Plaintext appears directly in place of ciphertext.
o All-zeroes output
o Full error byte diffusion: Results in randomized byte values, likely indicating a
fault occurring in round 8 or earlier.
o Partial error byte diffusion: Observed error byte diffusion patterns include 15-
byte, 4-byte, 2-byte, and single-byte diffusion, with 4-byte partial error byte
diffusion suggesting a likely hit in round 9.
• DFA Analysis: While DFA can be tested for ECB mode, no key extraction was achieved.
Although we have achieved the required types of errors, specifically full-byte error
diffusion in round 8 or earlier and 4-byte error partial diffusion in round 9, we have not yet
obtained the necessary exact byte patterns that would be useful for analysis. The glitching
tool's precision may not be sufficient to consistently generate the precise fault patterns
needed for optimal differential fault analysis (DFA). Refining the fault injection process,
potentially using EMFI or body biasing techniques, could improve the accuracy and help
achieve the exact byte patterns needed for more effective analysis.
4.3 Impact Assessment
• Data Exposed: This vulnerability allows direct access to sensitive plaintext data that
should remain protected by encryption, creating a serious risk of exposing confidential
information. When fault injection causes plaintext output instead of ciphertext, encryption
is bypassed entirely, exposing critical data such as passwords, cryptographic keys, or other
sensitive content to an attacker without requiring advanced cryptographic analysis like
DFA. This exposure compromises data confidentiality instantly across multiple encryption
modes (ECB, CBC, and CTR), affecting any application that relies on them for secure
communication. Attackers may retrieve critical data directly in plaintext, bypassing the
intended encryption protections, which could lead to unauthorized access and potential
misuse of sensitive assets. Additionally, it undermines secure communication protocols
between the SoC and other MCUs or connected devices, weakening the security of
confidential communication channels.