Title of article :
Faults, Injection Methods, and Fault Attacks
Author/Authors :
Chong Hee Kim، نويسنده , , Université Catholique de Louvain
Jean-Jacques Quisquater، نويسنده , , Université Catholique de Louvain
، نويسنده ,
Issue Information :
روزنامه با شماره پیاپی سال 2007
Abstract :
An active attacker can induce errors during the computation of the cryptographic algorithm and exploit the faulty results to extract information about the secret key in embedded systems. We call this kind of attack a fault attack. Fault attacks can break an unprotected system more quickly than any other kind of side-channel attack such as simple power analysis (SPA), differential power analysis (DPA), or electromagnetic analysis (EMA). For example, the attacker can break RSA-CRT (RSA with Chinese Remainder Theorem) with one faulty result, and Data Encryption Standard (DES) and Advanced Encryption Standard (AES) with two. Furthermore, the protection of fault attacks is more costly in terms of chip area. Here, we survey fault injection methods, types of faults, and fault attack models.
Journal title :
IEEE Design and Test of Computers
Journal title :
IEEE Design and Test of Computers