Fault attacks in symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

A survey on fault attacks on symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - ACM Computing Surveys, 2022 - dl.acm.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

Countermeasures for symmetric key ciphers

JM Schmidt, M Medwed - Fault analysis in cryptography, 2012 - Springer
Since a single fault can lead to a recovery of the whole secret key of an AES-128
implementation, protection against fault attacks is vital for security-related devices …

[PDF][PDF] Fault attacks and countermeasures.

M Otto - 2005 - martin-otto.de
Exchanging messages securely between two parties, without allowing a third party to
wiretap the conversation, is a problem, which is thousands of years old. It has been …

SIFA: exploiting ineffective fault inductions on symmetric cryptography

C Dobraunig, M Eichlseder, T Korak… - IACR Transactions on …, 2018 - tches.iacr.org
Since the seminal work of Boneh et al., the threat of fault attacks has been widely known and
techniques for fault attacks and countermeasures have been studied extensively. The vast …

Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures

A Barenghi, L Breveglieri, I Koren… - Proceedings of the …, 2012 - ieeexplore.ieee.org
Implementations of cryptographic algorithms continue to proliferate in consumer products
due to the increasing demand for secure transmission of confidential information. Although …

A comparative cost/security analysis of fault attack countermeasures

TG Malkin, FX Standaert, M Yung - Fault Diagnosis and Tolerance in …, 2006 - Springer
Deliberate injection of faults into cryptographic devices is an effective cryptanalysis
technique against symmetric and asymmetric encryption algorithms. To protect …

An operation-centered approach to fault detection in symmetric cryptography ciphers

L Breveglieri, I Koren, P Maistri - IEEE Transactions on …, 2007 - ieeexplore.ieee.org
One of the most effective ways of attacking a cryptographic device is by deliberate fault
injection during computation, which allows retrieving the secret key with a small number of …

Preventing fault attacks using fault randomisation with a case study on AES

S Ghosh, D Saha, A Sengupta… - … Journal of Applied …, 2017 - inderscienceonline.com
Fault attacks are one of the most effective side-channel attacks on symmetric key ciphers.
Over the years a variety of countermeasure techniques have been proposed to prevent this …

Static fault attacks on hardware des registers

P Loubet-Moundi, D Vigilant, F Olivier - Cryptology ePrint Archive, 2011 - eprint.iacr.org
In the late nineties, Eli Biham and Adi Shamir published the first paper on Differential Fault
Analysis on symmetric key algorithms. More specifically they introduced a fault model where …