Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Differential Fault Analysis Automation on Assembly Code

Over the past decades, fault injection attacks have been extensively studied due to their capability to efficiently break cryptographic implementations. Fault injection attack models are normally determined by analyzing the cipher structure and finding exploitable spots in non-linear and permutation layers. However, this level of abstraction is often too high to distinguish vulnerable parts of ...

متن کامل

Differential Fault Analysis Automation

Characterization of all possible faults in a cryptosystem exploitable for fault attacks is a problem which is of both theoretical and practical interest for the cryptographic community. The complete knowledge of exploitable fault space is desirable while designing optimal countermeasures for any given crypto-implementation. In this paper, we address the exploitable fault characterization proble...

متن کامل

Differential Fault Attacks on Elliptic Curve Cryptosystems

In this paper we extend the ideas for differential fault attacks on the RSA cryptosystem (see [4]) to schemes using elliptic curves. We present three different types of attacks that can be used to derive information about the secret key if bit errors can be inserted into the elliptic curve computations in a tamper-proof device. The effectiveness of the attacks was proven in a software simulatio...

متن کامل

Differential Fault Attacks on RSA Smartcards

Smart cards is a security technology that is becoming more and more popular. As a result, they are targets of criminals who wish to break their encryption in order to abuse what they protect. One form of attacks that can be used is the differential fault attack (DFA). This report will cover what are DFA’s, how they can be carried out against a smart card and solutions that can defend such an at...

متن کامل

Relaxed Differential Fault Analysis of SHA-3

In this paper, we propose a new method of differential fault analysis of SHA-3 which is based on the differential relations of the algorithm. Employing those differential relations in the fault analysis of SHA-3 gives new features to the proposed attacks, e.g., the high probability of fault detection and the possibility of re-checking initial faults and the possibility to recover internal state...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IACR Transactions on Cryptographic Hardware and Embedded Systems

سال: 2018

ISSN: 2569-2925

DOI: 10.46586/tches.v2018.i2.96-122