A Survey on Fault Attacks on Symmetric Key Cryptosystems

被引:18
|
作者
Baksi, Anubhab [1 ]
Bhasin, Shivam [1 ]
Breier, Jakub [2 ]
Jap, Dirmanto [1 ]
Saha, Dhiman [3 ]
机构
[1] Nanyang Technol Univ, Temasek Labs, 50 Nanyang Dr,Res Techno Plaza, Singapore 637553, Singapore
[2] Silicon Austria Labs, Inffeldgasse 33, Graz, Austria
[3] Indian Inst Technol, Dept Elect Engn & Comp Sci, Bhilai, India
关键词
Fault attacks; countermeasure; symmetric key; survey; COUNTERMEASURES; FRAMEWORK; FAMILY;
D O I
10.1145/3530054
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Fault attacks are among the well-studied topics in the area of cryptography. These attacks constitute a powerful tool to recover the secret key used in the encryption process. Fault attacks work by forcing a device to work under non-ideal environmental conditions (such as high temperature) or external disturbances (such as glitch in the power supply) while performing a cryptographic operation. The recent trend shows that the amount of research in this direction which ranges from attacking a particular primitive, proposing a fault countermeasure, to attacking countermeasures-has grown up substantially and is going to stay as an active research interest for the foreseeable future. Hence, it becomes apparent to have a comprehensive yet compact study of the (major) works. This work, which covers a wide spectrum in the present-day research on fault attacks that fall under the purview of the symmetric key cryptography, aims at fulfilling the absence of an up-to-date survey. We present mostly all aspects of the topic in a way that is not only understandable for a non-expert reader, but also helpful for an expert as a reference.
引用
收藏
页数:34
相关论文
共 50 条
  • [31] Fault Attacks on Stream Cipher Scream
    Du, Shaoyu
    Zhang, Bin
    Li, Zhenqi
    Lin, Dongdai
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 : 50 - 64
  • [32] Synthesis of Fault Attacks on Cryptographic Implementations
    Barthe, Gilles
    Dupressoir, Francois
    Fouque, Pierre-Alain
    Gregoire, Benjamin
    Zapalowicz, Jean-Christophe
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1016 - 1027
  • [33] Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited
    Joye, Marc
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2020, 14 (01) : 254 - 267
  • [34] Securing the AES Cryptographic Circuit Against Both Power and Fault Attacks
    Zhang, Jinbao
    Wu, Ning
    Zhou, Fang
    Ge, Fen
    Zhang, Xiaoqiang
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2019, 14 (05) : 2171 - 2180
  • [35] Formal verification of a CRT-RSA implementation against fault attacks
    Christofi, Maria
    Chetali, Boutheina
    Goubin, Louis
    Vigilant, David
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (03) : 157 - 167
  • [36] (In)security against fault injection attacks for CRT-RSA implementations
    Berzati, Alexandre
    Canovas, Cecile
    Goubin, Louis
    FDTC 2008: FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY, PROCEEDINGS, 2008, : 101 - +
  • [37] Securing the AES Cryptographic Circuit Against Both Power and Fault Attacks
    Jinbao Zhang
    Ning Wu
    Fang Zhou
    Fen Ge
    Xiaoqiang Zhang
    Journal of Electrical Engineering & Technology, 2019, 14 : 2171 - 2180
  • [38] Fiat-Shamir Identification Scheme Immune to the Hardware Fault Attacks
    Kim, Sung-Kyoung
    Kim, Tae Hyun
    Hong, Seokhie
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2013, 12
  • [39] Current Balancing Random Body Bias in FDSOI Cryptosystems as a Countermeasure to Leakage Power Analysis Attacks
    Palma, Kenneth
    Moll, Francesc
    IEEE ACCESS, 2022, 10 (13451-13459) : 13451 - 13459
  • [40] Further Heuristic Discussion on Two Countermeasures against Reaction Attacks on McEliece Cryptosystems with QCLDPC Codes
    Farkas, P.
    2019 EIGHTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), 2019,