DocumentCode :
2297170
Title :
Fault Injection, A Fast Moving Target in Evaluations
Author :
Bekkers, Rob ; König, Hans
Author_Institution :
Brightsight bv, Delft, Netherlands
fYear :
2011
fDate :
28-28 Sept. 2011
Firstpage :
65
Lastpage :
65
Abstract :
Differential Fault Analysis has been known since 1996 (Dan Boneh, Richard A. DeMillo and Richard J. Lipton, "The Bellcore Attack") [1]. Before that, the implementa tions of cryptographic functions were developed without the awareness of fault analysis attacks. The first fault injection set-ups produced single voltage glitches or single light flashes at a single location on the silicon. A range of countermeasures has been developed and applied in cryptographic devices since. But while the countermeasures against perturbation attacks were being developed, attack techniques also evolved. The accuracy of the timing was improved, multiple light flashes were used to circumvent double checks, perturbation attacks were being combined with side channels such as power consumption and detection methods developed to prevent chips from blocking after they detected the perturbation attempt. Against all these second generation attack methods new countermeasures were developed. This raised the level of security of secure microcontroller chips to a high level, especially compared to products of ten years ago. The certification schemes are mandating more and more advanced tests to keep secure systems secure in the future. One of the latest requirements is light manipulation test using power consumption waveform based triggering with multiple light flashes at multiple locations on the silicon. If attack scenarios that are as complicated as this one are in scope where will it end? The equipment necessary for the attack is expensive and special software is required. The perturbation attacks that are performed outside security labs and universities are of a different level.
Keywords :
cryptography; fault diagnosis; microcontrollers; cryptographic functions; differential fault analysis; double checks; fast moving target; fault analysis attacks; fault injection; perturbation attacks; secure microcontroller chips; security labs; side channels; single light flashes; single voltage glitches; universities; Certification; Cryptography; Power demand; Software; Testing; Timing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Fault Diagnosis and Tolerance in Cryptography (FDTC), 2011 Workshop on
Conference_Location :
Nara
Print_ISBN :
978-1-4577-1463-4
Type :
conf
DOI :
10.1109/FDTC.2011.20
Filename :
6076468
Link To Document :
بازگشت