2010 Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE 2010) 2010
DOI: 10.1109/date.2010.5456933
|View full text |Cite
|
Sign up to set email alerts
|

Fault-based attack of RSA authentication

Abstract: For any computing system to be secure, both hardware and software have to be trusted. If the hardware layer in a secure system is compromised, not only it would be possible to extract secret information about the software, but it would also be extremely hard for the software to detect that an attack is underway. In this work we detail a complete end-to-end fault-attack on a microprocessor system and practically demonstrate how hardware vulnerabilities can be exploited to target secure systems. We developed a t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0
1

Year Published

2010
2010
2024
2024

Publication Types

Select...
5
4
1

Relationship

2
8

Authors

Journals

citations
Cited by 61 publications
(37 citation statements)
references
References 14 publications
0
36
0
1
Order By: Relevance
“…Since programs trust the underlying hardware to correctly execute instructions, software developers rarely handle unexpected events such as hardware faults, even for widely adopted sensitive applications such as cryptographic routines. However, the effects on these applications can be dramatic when hardware infallibility is questioned, as shown in [13]. As the size of transistors decreases with technology, expected fault rates are projected to increase drastically, causing concerns on the correctness of computation by any computer system [2].…”
Section: Introductionmentioning
confidence: 99%
“…Since programs trust the underlying hardware to correctly execute instructions, software developers rarely handle unexpected events such as hardware faults, even for widely adopted sensitive applications such as cryptographic routines. However, the effects on these applications can be dramatic when hardware infallibility is questioned, as shown in [13]. As the size of transistors decreases with technology, expected fault rates are projected to increase drastically, causing concerns on the correctness of computation by any computer system [2].…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, if one allows active attacks, such as attacks based on fault injection in the circuit, then a full break of AES128 has been obtained in a few seconds, with only 2 pairs of correct and faulty ciphertext [97]. Note also that implementation of asymmetric cryptographic schemes, such as RSA, are also vulnerable to side-channels attacks [98]. To increase security, dedicated counter-measure need to be deployed, as 5.1 Practical security of QKD implementations and implementation loopholes well as extra layers of hardware protections (in order to physically restrict the possibility to launch such attacks).…”
Section: Practical Security Of Qkd Implementations and Implementationmentioning
confidence: 99%
“…The main focus of branch prediction analysis attack is to use a spy to detect the private key. The research work was named as "The power of Simple branch prediction analysis" [15], with in the 10 iterations the authors can invent 508 out of 512 bits of an RSA key. Andrea Pellegrini and Valeria Bertacco [16] discovered the research article named as Fault Based Attack of RSA Authentication.…”
Section: E Side Channel Analysis Attackmentioning
confidence: 99%