Exploiting statistical effective fault attack in a blind setting
نویسندگان
چکیده
In order to obtain the secret key, majority of physical attacks require knowledge plaintext or ciphertext, which may be unavailable cannot exploited. Blind are introduced do key recovery in circumstances where adversary has no direct access and ciphertext. A combination fault power can circumvent typical countermeasures this setting, for example, Fault Template Attack (FTA). However, FTA relies on bit injection, is difficult implement practice. The SIFA-blind, a framework executing Statistical Ineffective Attack, more flexible, but sensitivity setup noise missed faults its main drawback. To address deficiency, we suggest two ways use Effective blind setting that much less affected by when measuring traces, even though they not injection at level. demonstrate viability adaptability our proposed attacks, injected via glitch frequency onto ChipWhisperer board. While SEFA-blind does need bit-level fault, results it better than SIFA-blind number increases.
منابع مشابه
FPA-Debug: Effective Statistical Fault Localization Considering Fault-proneness Analysis
The aim is to identify faulty predicates which have strong effect on program failure. Statistical debugging techniques are amongst best methods for pinpointing defects within the program source code. However, they have some drawbacks. They require a large number of executions to identify faults, they might be adversely affected by coincidental correctness, and they do not take into consideratio...
متن کاملA Statistical Attack on RC6
This paper details the attack on RC6 which was announced in a report published in the proceedings of the second AES candidate conference (March 1999). Based on an observation on the RC6 statistics, we show how to distinguish RC6 from a random permutation and to recover the secret extended key for a fair number of rounds.
متن کاملA Novel Fault Detection and Classification Approach in Transmission Lines Based on Statistical Patterns
Symmetrical nature of mean of electrical signals during normal operating conditions is used in the fault detection task for dependable, robust, and simple fault detector implementation is presented in this work. Every fourth cycle of the instantaneous current signal, the mean is computed and carried into the next cycle to discover nonlinearities in the signal. A fault detection task is complete...
متن کاملA Fault Based Attack on MDS-AES
In this paper a fault based attack on MDS-AES has been proposed. It has been shown that inducing random byte fault at the input of the ninth round of the MDS-AES algorithm the key can be retrieved. Simulation shows that two faulty cipher text pairs are required to deduce the key without any brute-force search. If one faulty encryption is considered then the actual key can be ascertained with a ...
متن کاملA Differential Fault Attack on MICKEY 2.0
In this paper we present a differential fault attack on the stream cipher MICKEY 2.0 which is in eStream’s hardware portfolio. While fault attacks have already been reported against the other two eStream hardware candidates Trivium and Grain, no such analysis is known for MICKEY. Using the standard assumptions for fault attacks, we show that by injecting around 2 faults and performing 2 computa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Iet Information Security
سال: 2023
ISSN: ['1751-8709', '1751-8717']
DOI: https://doi.org/10.1049/ise2.12121