نتایج جستجو برای: differential fault analysis

تعداد نتایج: 3091401  

2013
M. Rasoulpoor

(Received: October 30, 2011; Accepted: December 8, 2011) Abstract: This paper presents a novel technique for transformer differential protection to prevent incorrect operation due to inrush current. The proposed method in this paper is based on time-frequency transform known as the Wavelet transform. The discrete Wavelet transform is used for analysis the differential current signals in time an...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده برق و کامپیوتر 1388

با توجه به این که در سیستم های صنعتی وقوع fault ممکن است منجر به خرابی کالا، خرابی دستگاه، افت عملکرد و یا تلفات جانی شود، شناسایی و تشخیص به موقع fault و همچنین جبران سازی آن از اهمیت کاربردی بسیار بالایی برخوردار می باشد. عمده ی سیستم های صنعتی را سیستم های غیر خطی و هایبرید با ورودی ها یا حالت های ناهمگون تشکیل می دهند. بنابراین شناسایی fault در این سیستم ها و تلاش برای جبران اثرات آن به کمک...

Journal: :IACR Cryptology ePrint Archive 2017
Hassan Qahur Al Mahri Leonie Ruth Simpson Harry Bartlett Ed Dawson Kenneth Koon-Ho Wong

The XOR-Encrypt-XOR (XEX) block cipher mode was introduced by Rogaway in 2004. XEX mode uses nonce-based secret masks (L) that are distinct for each message. The existence of secret masks in XEX mode prevents the application of conventional fault attack techniques, such as differential fault analysis. This work investigates other types of fault attacks against XEX mode that either eliminate the...

2008
Chong Hee Kim Jean-Jacques Quisquater

In this paper we show a new differential fault analysis (DFA) on the AES-128 key scheduling process. We can obtain 96 bits of the key with 2 pairs of correct and faulty ciphertexts enabling an easy exhaustive key search of 2 keys. Furthermore we can retrieve the entire 128 bits with 4 pairs. To the authors’ best knowledge, it is the smallest number of pairs to find the entire AES-128 key with a...

Journal: :IACR Transactions on Cryptographic Hardware and Embedded Systems 2019

Journal: :IACR Cryptology ePrint Archive 2011
Philippe Loubet-Moundi David Vigilant Francis Olivier

In the late nineties, Eli Biham and Adi Shamir published the first paper on Differential Fault Analysis on symmetric key algorithms. More specifically they introduced a fault model where a key bit located in non-volatile memory is forced to 0/1 with a fault injection. In their scenario the fault was permanent, and could lead the attacker to full key recovery with low complexity. In this paper, ...

Journal: :IJTMCC 2014
Guillaume Bouffard Bhagyalekshmy N. Thampi Jean-Louis Lanet

Security and attacks are two sides of the same coin in the smart card industry. Smart cards are prone to different types of attacks to gain access to the assets stored in it and that can cause security issues. It is necessary to identify and exploit these attacks and implement appropriate countermeasures to mitigate their effects. Fault attacks are one among them. They can introduce abnormal be...

2015
Nahid Farhady Ghalaty Bilgiday Yuce Patrick Schaumont

Differential Fault Intensity Analysis (DFIA) is a recently introduced fault analysis technique. This technique is based on the observation that faults are biased and thus are non-uniformly distributed over the cipher state variables. The adversary uses the fault bias as a source of leakage by controlling the intensity of fault injection. DFIA exploits statistical analysis to correlate the secre...

Journal: :IEEE Trans. Mob. Comput. 2016
Guillermo Suarez-Tangil Juan E. Tapiador Flavio Lombardi Roberto Di Pietro

Malware for smartphones has rocketed over the last years. Market operators face the challenge of keeping their stores free from malicious apps, a task that has become increasingly complex as malware developers are progressively using advanced techniques to defeat malware detection tools. One such technique commonly observed in recent malware samples consists of hiding and obfuscating modules co...

Journal: :J. Internet Serv. Inf. Secur. 2012
Jeong-Soo Park KiSeok Bae YongJe Choi Dooho Choi JaeCheol Ha

The goal of a fault injection attack is to extract a secret key which is embedded in a cryptographic device by injecting a fault during execution of the algorithm. In particular, an attacker can extract the master key of the advanced encryption standard (AES) using only a one-byte fault injection. We propose a new countermeasure method resistant to fault injection attacks by checking the differ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید