2020
DOI: 10.1007/978-3-030-45721-1_22
|View full text |Cite
|
Sign up to set email alerts
|

Fault Template Attacks on Block Ciphers Exploiting Fault Propagation

Abstract: Fault attacks (FA) are one of the potent practical threats to modern cryptographic implementations. Over the years the FA techniques have evolved, gradually moving towards the exploitation of devicecentric properties of the faults. In this paper, we exploit the fact that activation and propagation of a fault through a given combinational circuit (i.e., observability of a fault) is data-dependent. Next, we show that this property of combinational circuits leads to powerful Fault Template Attacks (FTA), even for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 38 publications
(19 citation statements)
references
References 24 publications
0
19
0
Order By: Relevance
“…In [20], the authors provide a ML-assisted technique to explore and characterize the fault attack space and use the knowledge of a known fault attack on a cipher in understanding new attack instances. Regarding detection of fault attacks, a recent work [19] is presented that evaluates fault induced leakages from noncryptographic peripheral components of a security module, targeting cipher implementations, using a Deep Neural Network (DNN) test. From the defensive side, while most fault analyses are based on the characterized faults from known attacks (like [6]), our work is based on a completely different approach of online identification of attacks using real-time sensors.…”
Section: Detecting Fault Attacks With Machine Learningmentioning
confidence: 99%
“…In [20], the authors provide a ML-assisted technique to explore and characterize the fault attack space and use the knowledge of a known fault attack on a cipher in understanding new attack instances. Regarding detection of fault attacks, a recent work [19] is presented that evaluates fault induced leakages from noncryptographic peripheral components of a security module, targeting cipher implementations, using a Deep Neural Network (DNN) test. From the defensive side, while most fault analyses are based on the characterized faults from known attacks (like [6]), our work is based on a completely different approach of online identification of attacks using real-time sensors.…”
Section: Detecting Fault Attacks With Machine Learningmentioning
confidence: 99%
“…We consider a template building phase [20] wherein the faults are targeted at the registers storing the masks 3 0 and 1 2 . In order to build the templates for obtaining the various bits of a nibble of the PRESENT cipher we consider the following faults:…”
Section: Fault Location and Attack Outlinementioning
confidence: 99%
“…This often restricts the attacks to the starting or finishing rounds of the block cipher. Recently, the first profiled fault attack, called Fault Template Attack (FTA) was proposed [20]. FTA is based on fault propagation characteristic which is dependent on the inputs to a Boolean circuit and is defined in a fault template collected in a profiling phase.…”
Section: Introductionmentioning
confidence: 99%
“…Nowadays, 25 years after these attacks were published, this area has become one of the major areas in hardware security, alongside the passive side-channel attacks (SCA) [3]. Many analysis methods have been published to date, to mention the most prominent ones apart from the DFA: statistical ineffective fault analysis (SIFA) [4], persistent fault attack (PFA) [5], fault sensitivity analysis (FSA) [6], fault template attacks (FTA) [7], and FIA combined with SCA [8]. Aside from targeting cryptography, fault attacks have been used for bypassing checking routines [9], [10], and even faulting neural network…”
Section: Introductionmentioning
confidence: 99%