A survey on fault attacks on symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - ACM Computing Surveys, 2022 - dl.acm.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

Fault attacks on secure embedded software: Threats, design, and evaluation

B Yuce, P Schaumont, M Witteman - Journal of Hardware and Systems …, 2018 - Springer
Embedded software is developed under the assumption that hardware execution is always
correct. Fault attacks break and exploit that assumption. Through the careful introduction of …

[PDF][PDF] 密码产品的侧信道分析与评估

陈华, 习伟, 范丽敏, 焦志鹏, 冯婧怡 - 电子与信息学报, 2020 - jeit.ac.cn
作为一类重要的信息安全产品, 密码产品中所使用的密码技术保障了信息的保密性,
完整性和不可抵赖性. 而侧信道攻击是针对密码产品的一类重要的安全威胁 …

Security analysis of concurrent error detection against differential fault analysis

X Guo, D Mukhopadhyay, C Jin, R Karri - Journal of Cryptographic …, 2015 - Springer
Differential fault analysis (DFA) poses a significant threat to advanced encryption standard
(AES). Only a single faulty ciphertext is required to extract the secret key. Concurrent error …

Fault attacks in symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

XFC: A framework for exploitable fault characterization in block ciphers

P Khanna, C Rebeiro, A Hazra - Proceedings of the 54th Annual Design …, 2017 - dl.acm.org
Fault attacks recover secret keys by exploiting faults injected during the execution of a block
cipher. However, not all faults are exploitable and every exploitable fault is associated with …

Si-backside protection circuits against physical security attacks on flip-chip devices

T Miki, M Nagata, H Sonoda, N Miura… - IEEE Journal of Solid …, 2020 - ieeexplore.ieee.org
This article presents a cryptographic key protection technique from physical security attacks
through Si-backside of IC chip. Flip-chip packaging leads to a serious security hole that …

A 286 F2/Cell Distributed Bulk-Current Sensor and Secure Flush Code Eraser Against Laser Fault Injection Attack on Cryptographic Processor

K Matsuda, T Fujii, N Shoji, T Sugawara… - IEEE Journal of Solid …, 2018 - ieeexplore.ieee.org
Laser fault injection (LFI) attack on cryptographic processors is a serious threat to
information security. This paper proposes a sense-and-react countermeasure against LFI. A …

Classical and physical security of symmetric key cryptographic algorithms

A Baksi - 2021 IFIP/IEEE 29th International Conference on Very …, 2021 - ieeexplore.ieee.org
Symmetric key cryptography is one of the cornerstones of security in the modern era of
electronic communication. The symmetric key algorithms, known as the ciphers, are to …

Learn from your faults: leakage assessment in fault attacks using deep learning

S Saha, M Alam, A Bag, D Mukhopadhyay… - Journal of …, 2023 - Springer
Generic vulnerability assessment of cipher implementations against Fault Attacks (FA) is a
largely unexplored research area. Security assessment against FA is critical for FA …