2020
DOI: 10.46586/tches.v2021.i1.192-216
|View full text |Cite
|
Sign up to set email alerts
|

Fault Injection as an Oscilloscope: Fault Correlation Analysis

Abstract: Fault Injection (FI) attacks have become a practical threat to modern cryptographic implementations. Such attacks have recently focused more on exploitation of implementation-centric and device-specific properties of the faults. In this paper, we consider the parallel between SCA attacks and FI attacks; specifically, that many FI attacks rely on the data-dependency of activation and propagation of a fault, and SCA attacks similarly rely on data-dependent power usage. In fact, these are so closely related that … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 25 publications
(36 reference statements)
0
6
0
Order By: Relevance
“…Moreover, in the case of fault injection under conditions where the cryptographic equipment is not directly accessible, the secret key extraction methods that can be used are limited because the faults occur randomly [6]. However, since the proposed method can cause faults at arbitrary times, various analysis methods proposed in past studies [12], [13], [14], [15] may be applicable, and secret keys may be analyzed in a shorter time.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, in the case of fault injection under conditions where the cryptographic equipment is not directly accessible, the secret key extraction methods that can be used are limited because the faults occur randomly [6]. However, since the proposed method can cause faults at arbitrary times, various analysis methods proposed in past studies [12], [13], [14], [15] may be applicable, and secret keys may be analyzed in a shorter time.…”
Section: Discussionmentioning
confidence: 99%
“…The attack requires an injection method that induces a temporary computational fault in the operation of the cryptographic module, and an analysis method that can extract the secret key from the faulty output obtained. Based on these requirements, existing research include theoretical methods that hypothesize the occurrence of a fault in a specific intermediate process of the cryptographic algorithm, they then use the faulty output to estimate the secret key [9], [10], [11], [12], [13], [14], [15]. Research focused on injection methods has investigated specific approaches for generating faults required for secret key estimation in real cryptographic modules.…”
mentioning
confidence: 99%
“…In the following, we write (d, k)-combined security when we do not restrict the fault type and location. Further, we emphasize the adversarial knowledge on faults, since injecting faults is strongly linked to placing probes [Cla07,SMC21]. Remark 1 (Adversarial Knowledge on Faults).…”
Section: Correctnessmentioning
confidence: 99%
“…Several physical glitching set-ups have been proposed [OC,KKM + 18,SMC20]. Furthermore, Krautter et al were even able to show that on-chip power glitching is feasible even without a physical glitching set-up [KGT18].…”
Section: Glitch-based Fault Injection Analysismentioning
confidence: 99%