Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








54 Hits in 3.8 sec

Precise fault-injections using voltage and temperature manipulation for differential cryptanalysis

Raghavan Kumar, Philipp Jovanovic, Ilia Polian
2014 2014 IEEE 20th International On-Line Testing Symposium (IOLTS)  
We investigate selection of supply-voltage and temperature values that are suitable for high-precision fault injection even up to a single bit.  ...  However, they require temporal and spatial accuracies of fault injection that were believed to rule out low-cost injection techniques such as voltage, frequency or temperature manipulation.  ...  We demonstrated that low-cost voltage and temperature manipulations can be used for high-precision fault injection required to break recent ciphers.  ... 
doi:10.1109/iolts.2014.6873670 dblp:conf/iolts/KumarJP14 fatcat:gybee5fm5rb4dertw36nsv246u

Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware

Raghavan Kumar, Philipp Jovanovic, Wayne Burleson, Ilia Polian
2014 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography  
Full circuit-level simulation followed by differential cryptanalysis demonstrate that the secret key can be reconstructed after around 5 fault-injections.  ...  These Trojans are activated with very low probability under the presence of a slightly reduced supply voltage (0.001 for 20% V dd reduction).  ...  We use this circuit for Trojan-based fault injection and cryptanalysis. C. Differential Fault Analysis of PRINCE The differential fault analysis on PRINCE is performed in two stages.  ... 
doi:10.1109/fdtc.2014.12 dblp:conf/fdtc/KumarJBP14 fatcat:mwyiux2wsfgkvputirgmrkytua

Fault Attacks on Secure Embedded Software: Threats, Design and Evaluation [article]

Bilgiday Yuce, Patrick Schaumont, Marc Witteman
2020 arXiv   pre-print
The modified program execution is then analyzed and used as a source of information leakage, or as a mechanism for privilege escalation.  ...  For example, the assumption that an adversary has to be close to the physical execution of software, in order to inject an exploitable fault into hardware, has repeatedly been shown to be incorrect.  ...  ACKNOWLEDGEMENTS The authors would like to thank Dennis Vermoen from Riscure Security Lab for his help and support.  ... 
arXiv:2003.10513v1 fatcat:paebhdl4cjhfvp7o5skttooyym

Fault Attacks In Symmetric Key Cryptosystems [article]

Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap, Dhiman Saha
2020 IACR Cryptology ePrint Archive  
and going to stay as an active research interest for a foreseeable future.  ...  Fault attacks are among the well-studied topics in the area of cryptography. These attacks constitute a powerful tool to recover the secret key used in the encryption process.  ...  The disturbances could be injected by means of, for example, voltage glitches, Light Amplification by Stimulated Emission of Radiation (LASER) shots, sudden temperature variations.  ... 
dblp:journals/iacr/BaksiBBJS20 fatcat:dln4jkk6mvb33okcmlwrkkjm54

Power-based Side Channel Analysis and Fault Injection: Hacking Techniques and Combined Countermeasure

Noura Benhadjyoussef, Mouna Karmani, Mohsen Machhout
2021 International Journal of Advanced Computer Science and Applications  
Hence, the majority of these secured approaches are used for precise and single attack and it is difficult to thwart hybrid attack, such as combined power and fault attacks.  ...  In this work, the Advanced Encryption Standard is used as a case study in order to analyse the most well-known physical-based Hacking techniques: Differential Fault Analysis (DFA) and Correlation Power  ...  The fault injection is done by means of Electromagnetic field, supply voltage variation, laser beam, or temperature control.  ... 
doi:10.14569/ijacsa.2021.0120583 fatcat:3rgsgj7nf5eqxdhjfwf6xpa6wu

Smart Card Security [chapter]

Michael Tunstall
2013 Secure Smart Embedded Devices, Platforms and Applications  
In this chapter, a description of the various attacks and countermeasures that apply to secure smart card applications are described.  ...  Faults in DES A type of cryptanalysis of ciphertext blocks produced by injecting faults into DES was proposed in [8] , based on using techniques used in differential cryptanalysis [31] .  ...  These are used to detect unusual events in the voltage and clock supplied to the card, and the environmental conditions (e.g. the temperature).  ... 
doi:10.1007/978-1-4614-7915-4_7 fatcat:wcsmbryrezhjfksojwwa2rb2kq

Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Analysis [article]

Carlton Shepherd, Konstantinos Markantonakis, Nico van Heijningen, Driss Aboulkassimi, Clément Gaine, Thibaut Heckmann, David Naccache
2021 arXiv   pre-print
In total, we comprehensively survey over 50 fault injection and side-channel attack papers published between 2009-2021.  ...  In this survey, we consolidate recent developments in physical fault injections and side-channel attacks on modern mobile devices.  ...  The authors would like to thank the EXFILES WP5 project partners for comments and discussions around the topic of this work.  ... 
arXiv:2105.04454v5 fatcat:27ldfag7ejgvxh7cbs2qnevb24

Plundervolt: Software-based Fault Injection Attacks against Intel SGX

Kit Murdock, David Oswald, Flavio D. Garcia, Jo Van Bulck, Daniel Gruss, Frank Piessens
2020 2020 IEEE Symposium on Security and Privacy (SP)  
Design restrictions ensure frequency and voltage are adjusted as a pair, based on the current load, because for each frequency there is only a certain voltage range where the processor can operate correctly  ...  For this purpose, many processors (including the widespread Intel Core series) expose privileged software interfaces to dynamically regulate processor frequency and operating voltage.  ...  ACKNOWLEDGMENTS This research is partially funded by the Research Fund KU Leuven, and by the Agency for Innovation and Entrepreneurship (Flanders).  ... 
doi:10.1109/sp40000.2020.00057 dblp:conf/sp/MurdockOGBGP20 fatcat:hk23tfteyrb3pbp7gkczqgp4re

Plundervolt: Software-based Fault Injection Attacks against Intel SGX

K. Murdock, D. Oswald, F. Garcia, J. Bulck, D. Gruss, F. Piessens
2020 Zenodo  
Design restrictions ensure frequency and voltage are adjusted as a pair, based on the current load, because for each frequency there is only a certain voltage range where the processor can operate correctly  ...  For this purpose, many processors (including the widespread Intel Core series) expose privileged software interfaces to dynamically regulate processor frequency and operating voltage.  ...  ACKNOWLEDGMENTS This research is partially funded by the Research Fund KU Leuven, and by the Agency for Innovation and Entrepreneurship (Flanders).  ... 
doi:10.5281/zenodo.3952135 fatcat:67z2ko4p4rcgfbt6gvykbyviyi

A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices [chapter]

Timo Kasper, David Oswald, Christof Paar
2010 Lecture Notes in Computer Science  
The corresponding data acquisition system for side-channel attacks makes precise power and EM analyses possible.  ...  We introduce several methods for the automatic profiling of cryptographic devices and model their behaviour both with respect to side-channel analysis and fault injection.  ...  ., power analysis (Differential Power Analysis (DPA), Simple Power Analysis (SPA), template attacks), and active attacks, i.e., fault injection or microprobing.  ... 
doi:10.1007/978-3-642-17499-5_5 fatcat:yd7vx5jw5vh2boctlr2z2hjxcm

The Sorcerer's Apprentice Guide to Fault Attacks

H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, C. Whelan
2006 Proceedings of the IEEE  
Since then various mechanisms for fault creation and propagation have been discovered and researched.  ...  This paper covers the various methods that can be used to induce faults in semiconductors and exploit such errors maliciously.  ...  Using the techniques of differential cryptanalysis, we obtain about five bits of information about the eight key bits that were not xor'ed as a result of the induced fault.  ... 
doi:10.1109/jproc.2005.862424 fatcat:djg7jmfjxbdjbpm3mehfbjqjtu

Hardware Designer's Guide to Fault Attacks

Dusko Karaklajic, Jorn-Marc Schmidt, Ingrid Verbauwhede
2013 IEEE Transactions on Very Large Scale Integration (vlsi) Systems  
We analyze fault attacks from different aspects and expose the mechanisms they employ to reveal a secret parameter of a device.  ...  This paper gives an insight into the field of fault attacks and countermeasures to help the designer to protect the design against this type of implementation attacks.  ...  Afterwards, a technique from cryptoanalysis, the differential cryptanalysis, is applied to construct and solve differential fault equations in order to deduce bits of the secret key.  ... 
doi:10.1109/tvlsi.2012.2231707 fatcat:4mhbkwfw3jgttptpc6ck5czwba

Hardware Countermeasures Benchmarking against Fault Attacks

Francisco Eugenio Potestad-Ordóñez, Erica Tena-Sánchez, Antonio José Acosta-Jiménez, Carlos Jesús Jiménez-Fernández, Ricardo Chaves
2022 Applied Sciences  
The development of differential fault analysis (DFA) techniques and mechanisms to inject faults into cryptographic circuits brings with it the need to use protection mechanisms that guarantee the expected  ...  The eight different types of fault that allow us to perform DFAs on the AES cipher have been differentiated, as well as the vulnerabilities of the cipher.  ...  Acknowledgments: Authors want to acknowledge to projects Programa Operativo FEDER 2014-2020 and Consejería de Economía, Conocimiento, Empresas y Universidad de la Junta de Andalucía under Project US-1380823  ... 
doi:10.3390/app12052443 fatcat:ljycbggo7vf6xeded2mbqychx4

Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection [chapter]

Konrad J. Kulikowski, Mark G. Karpovsky, Alexander Taubin
2006 Lecture Notes in Computer Science  
They make no assumptions about what faults or errors will be injected by an attacker and have fewer undetectable errors than linear codes with the same (n,k).  ...  We also present optimization approaches which provide for a tradeoff between the levels of robustness and required overhead for hardware implementations.  ...  The multiplicity of faults can be controlled by manipulating the fault injection mechanisms such as the level of radiation, temperature, etc.  ... 
doi:10.1007/11889700_17 fatcat:hld5ghd2qvclfpwjfie6bfibne

Beware of Insufficient Redundancy

Timo Bartkewitz, Sven Bettendorf, Thorben Moos, Amir Moradi, Falk Schellenberg
2022 Transactions on Cryptographic Hardware and Embedded Systems  
In our case, a standard black-box scan over the target using a common single-shot LFI setup is sufficient to occasionally inject more single-bit faults than those bounded by the underlying adversary model  ...  Fault injection attacks pose a serious threat to cryptographic implementations. Countermeasures beyond sensors and shields usually deploy some form of redundancy to detect or even correct errors.  ...  406956718 'SuCCESS' and by the European Union (EU) through the ERC project 724725 (acronym SWORD).  ... 
doi:10.46586/tches.v2022.i3.438-462 fatcat:uovltmacl5fw3nrvyoocxkc2zm
« Previous Showing results 1 — 15 out of 54 results