A survey on fault attacks on symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - ACM Computing Surveys, 2022 - dl.acm.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

How practical are fault injection attacks, really?

J Breier, X Hou - IEEE Access, 2022 - ieeexplore.ieee.org
Fault injection attacks (FIA) are a class of active physical attacks, mostly used for malicious
purposes such as extraction of cryptographic keys, privilege escalation, attacks on neural …

Hardware constructions for error detection in WG-29 stream cipher benchmarked on FPGA

J Kaur, AC Canto, MM Kermani… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
WG-29 is a Welch-Gong (WG) stream cipher, implemented in and an 11-stage LFSR, whose
polynomial-basis (PB)-based architecture is utilized in diverse applications. This work, for …

Combined private circuits-combined security refurbished

J Feldtkeller, T Güneysu, T Moos… - Proceedings of the …, 2023 - dl.acm.org
Physical attacks are well-known threats to cryptographic implementations. While
countermeasures against passive Side-Channel Analysis (SCA) and active Fault Injection …

Fault injection as an oscilloscope: fault correlation analysis

A Spruyt, A Milburn, Ł Chmielewski - IACR Transactions on …, 2021 - tches.iacr.org
Fault Injection (FI) attacks have become a practical threat to modern cryptographic
implementations. Such attacks have recently focused more on exploitation of …

Learn from your faults: leakage assessment in fault attacks using deep learning

S Saha, M Alam, A Bag, D Mukhopadhyay… - Journal of …, 2023 - Springer
Generic vulnerability assessment of cipher implementations against Fault Attacks (FA) is a
largely unexplored research area. Security assessment against FA is critical for FA …

Statistical effective fault attacks: the other side of the coin

N Vafaei, S Zarei, N Bagheri… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
The introduction of Statistical Ineffective Fault Attacks (SIFA) has led to a renewed interest in
fault attacks. SIFA requires minimal knowledge of the concrete implementation and is …

Non-profiled side-channel assisted fault attack: A case study on domrep

S Saha, P Ravi, D Jap, S Bhasin - 2023 Design, Automation & …, 2023 - ieeexplore.ieee.org
Recent work has shown that Side-Channel Attacks (SCA) and Fault Attacks (FA) can be
combined, forming an extremely powerful adversarial model, which can bypass even some …

Stati: Protecting against fault attacks using stable threshold implementations

S Dhooghe, A Ovchinnikov, D Toprakhisar - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Fault attacks impose a serious threat against the practical implementations of cryptographic
algorithms. Statistical Ineffective Fault Attacks (SIFA), exploiting the dependency between …

Carry your fault: A fault propagation attack on side-channel protected lwe-based kem

S Kundu, S Chowdhury, S Saha, A Karmakar… - arXiv preprint arXiv …, 2024 - arxiv.org
Post-quantum cryptographic (PQC) algorithms, especially those based on the learning with
errors (LWE) problem, have been subjected to several physical attacks in the recent past …