2014 IEEE 20th International on-Line Testing Symposium (IOLTS) 2014
DOI: 10.1109/iolts.2014.6873670
|View full text |Cite
|
Sign up to set email alerts
|

Precise fault-injections using voltage and temperature manipulation for differential cryptanalysis

Abstract: Abstract-State-of-the-art fault-based cryptanalysis methods are capable of breaking most recent ciphers after only a few fault injections. However, they require temporal and spatial accuracies of fault injection that were believed to rule out low-cost injection techniques such as voltage, frequency or temperature manipulation. We investigate selection of supply-voltage and temperature values that are suitable for high-precision fault injection even up to a single bit. The object of our studies is an ASIC imple… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…To perform an invasive attack, it is required to remove at least part of the passivation layer to establish the contact between the probes and silicon [16]. Non-invasive attacks, on the other hand, mainly focus on investigating the settings that can be controlled externally [17], or passively measuring the running time, the cache behavior, the power consumption, and/or the electromagnetic radiation of the device through the package [18].…”
Section: Fault Injection Attacksmentioning
confidence: 99%
“…To perform an invasive attack, it is required to remove at least part of the passivation layer to establish the contact between the probes and silicon [16]. Non-invasive attacks, on the other hand, mainly focus on investigating the settings that can be controlled externally [17], or passively measuring the running time, the cache behavior, the power consumption, and/or the electromagnetic radiation of the device through the package [18].…”
Section: Fault Injection Attacksmentioning
confidence: 99%
“…Thus, it can be deduced that each attempt carries a 50% probability of no effect, a 27.5% chance of a reboot failure, a 20.5% chance of a communication failure, and a 12% chance of a glitch. Finally, it is imperative to consider the temperature during the tests since it has a significant impact on the failure rate [ 13 , 28 , 30 ]. Despite restricting the temperature variation to between 19 °C and 23 °C, the outcomes might have been marginally affected.…”
Section: Analysis and Discussionmentioning
confidence: 99%
“…However, these attacks are not necessarily limited to manipulating a single parameter. In [ 30 ], an FIA is executed combining voltage and heat glitches, while in [ 28 ], heat is combined with a clock glitch. Therefore, the parameters that are not part of the attack must be controlled to guarantee the expected result.…”
Section: Introductionmentioning
confidence: 99%
“…Precise high variations, or power spikes, modify the state of latches of flip-flops, influencing the control and data path logic of the circuit [25]. For example, if the voltage spike happens during memory reading, wrong data may be retrieved.…”
Section: A Clock/voltage Glitchingmentioning
confidence: 99%