A Survey on Fault Attacks on Symmetric Key Cryptosystems

被引:18
|
作者
Baksi, Anubhab [1 ]
Bhasin, Shivam [1 ]
Breier, Jakub [2 ]
Jap, Dirmanto [1 ]
Saha, Dhiman [3 ]
机构
[1] Nanyang Technol Univ, Temasek Labs, 50 Nanyang Dr,Res Techno Plaza, Singapore 637553, Singapore
[2] Silicon Austria Labs, Inffeldgasse 33, Graz, Austria
[3] Indian Inst Technol, Dept Elect Engn & Comp Sci, Bhilai, India
关键词
Fault attacks; countermeasure; symmetric key; survey; COUNTERMEASURES; FRAMEWORK; FAMILY;
D O I
10.1145/3530054
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Fault attacks are among the well-studied topics in the area of cryptography. These attacks constitute a powerful tool to recover the secret key used in the encryption process. Fault attacks work by forcing a device to work under non-ideal environmental conditions (such as high temperature) or external disturbances (such as glitch in the power supply) while performing a cryptographic operation. The recent trend shows that the amount of research in this direction which ranges from attacking a particular primitive, proposing a fault countermeasure, to attacking countermeasures-has grown up substantially and is going to stay as an active research interest for the foreseeable future. Hence, it becomes apparent to have a comprehensive yet compact study of the (major) works. This work, which covers a wide spectrum in the present-day research on fault attacks that fall under the purview of the symmetric key cryptography, aims at fulfilling the absence of an up-to-date survey. We present mostly all aspects of the topic in a way that is not only understandable for a non-expert reader, but also helpful for an expert as a reference.
引用
收藏
页数:34
相关论文
共 50 条
  • [11] Novel orbit based symmetric cryptosystems
    Vrahatis, M. N.
    Tsirogiannis, G. A.
    Laskari, E. C.
    MATHEMATICAL AND COMPUTER MODELLING, 2010, 51 (3-4) : 239 - 246
  • [12] Deep round key recovery attacks and countermeasure in persistent fault model: a case study on GIFT and KLEIN
    Joshi, Priyanka
    Mazumdar, Bodhisatwa
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2024, 14 (01) : 103 - 125
  • [13] Deep round key recovery attacks and countermeasure in persistent fault model: a case study on GIFT and KLEIN
    Priyanka Joshi
    Bodhisatwa Mazumdar
    Journal of Cryptographic Engineering, 2024, 14 : 103 - 125
  • [14] Hardware Designer's Guide to Fault Attacks
    Karaklajic, Dusko
    Schmidt, Joern-Marc
    Verbauwhede, Ingrid
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2013, 21 (12) : 2295 - 2306
  • [15] Securing AES Implementation Against Fault Attacks
    Genelle, Laurie
    Giraud, Christophe
    Prouff, Emmanuel
    2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, : 51 - 62
  • [16] Securing AES Implementation Against Fault Attacks
    Genelle, Laurie
    Giraud, Christophe
    Prouff, Emmanuel
    PROCEEDINGS OF THE 2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, : 51 - 62
  • [17] Securing Conditional Branches in the Presence of Fault Attacks
    Schilling, Robert
    Werner, Mario
    Mangard, Stefan
    PROCEEDINGS OF THE 2018 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2018, : 1586 - 1591
  • [18] Scan attacks on side-channel and fault attack resistant public-key implementations
    Jean Da Rolt
    Amitabh Das
    Santosh Ghosh
    Giorgio Di Natale
    Marie-Lise Flottes
    Bruno Rouzeyre
    Ingrid Verbauwhede
    Journal of Cryptographic Engineering, 2012, 2 (4) : 207 - 219
  • [19] Scan attacks on side-channel and fault attack resistant public-key implementations
    Da Rolt, Jean
    Das, Amitabh
    Ghosh, Santosh
    Di Natale, Giorgio
    Flottes, Marie-Lise
    Rouzeyre, Bruno
    Verbauwhede, Ingrid
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (04) : 207 - 219
  • [20] Table Redundancy Method for Protecting Against Fault Attacks
    Lee, Seungkwang
    Jho, Nam-Su
    Kim, Myungchul
    IEEE ACCESS, 2021, 9 : 92214 - 92223