A survey on fault attacks on symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - ACM Computing Surveys, 2022 - dl.acm.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

Fault attacks in symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

SIFA: exploiting ineffective fault inductions on symmetric cryptography

C Dobraunig, M Eichlseder, T Korak… - IACR Transactions on …, 2018 - tches.iacr.org
Since the seminal work of Boneh et al., the threat of fault attacks has been widely known and
techniques for fault attacks and countermeasures have been studied extensively. The vast …

Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures

A Barenghi, L Breveglieri, I Koren… - Proceedings of the …, 2012 - ieeexplore.ieee.org
Implementations of cryptographic algorithms continue to proliferate in consumer products
due to the increasing demand for secure transmission of confidential information. Although …

A comparative cost/security analysis of fault attack countermeasures

TG Malkin, FX Standaert, M Yung - Fault Diagnosis and Tolerance in …, 2006 - Springer
Deliberate injection of faults into cryptographic devices is an effective cryptanalysis
technique against symmetric and asymmetric encryption algorithms. To protect …

An operation-centered approach to fault detection in symmetric cryptography ciphers

L Breveglieri, I Koren, P Maistri - IEEE Transactions on …, 2007 - ieeexplore.ieee.org
One of the most effective ways of attacking a cryptographic device is by deliberate fault
injection during computation, which allows retrieving the secret key with a small number of …

[PDF][PDF] Fault attacks and countermeasures.

M Otto - 2005 - martin-otto.de
Exchanging messages securely between two parties, without allowing a third party to
wiretap the conversation, is a problem, which is thousands of years old. It has been …

The fault attack jungle-a classification model to guide you

I Verbauwhede, D Karaklajic… - 2011 Workshop on Fault …, 2011 - ieeexplore.ieee.org
For a secure hardware designer, the vast array of fault attacks and countermeasures looks
like a jungle. This paper aims at providing a guide through this jungle and at helping a …

Fault attacks on AES and their countermeasures

S Ali, X Guo, R Karri, D Mukhopadhyay - Secure System Design and …, 2016 - Springer
Fault Attacks exploit malicious or accidental faults injected during the computation of a
cryptographic algorithm. Combining the seminal idea by Boneh, DeMillo and Lipton with …

Fault analysis of infective AES computations

A Battistello, C Giraud - 2013 Workshop on Fault Diagnosis and …, 2013 - ieeexplore.ieee.org
Fault attacks are a common threat for embedded secure implementations. Among the
various kinds of countermeasures proposed so far, the principle of infective computation …