Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures

被引:349
作者
Barenghi, Alessandro [1 ]
Breveglieri, Luca [1 ]
Koren, Israel [2 ]
Naccache, David [3 ]
机构
[1] Politecn Milan, I-20133 Milan, Italy
[2] Univ Massachusetts, Amherst, MA 01003 USA
[3] Ecole Normale Super, F-75230 Paris, France
关键词
Countermeasures; cryptographic devices; fault injection; power analysis; side-channel attacks; RESISTANT; IMPLEMENTATION; ERRORS;
D O I
10.1109/JPROC.2012.2188769
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Implementations of cryptographic algorithms continue to proliferate in consumer products due to the increasing demand for secure transmission of confidential information. Although the current standard cryptographic algorithms proved to withstand exhaustive attacks, their hardware and software implementations have exhibited vulnerabilities to side channel attacks, e. g., power analysis and fault injection attacks. This paper focuses on fault injection attacks that have been shown to require inexpensive equipment and a short amount of time. The paper provides a comprehensive description of these attacks on cryptographic devices and the countermeasures that have been developed against them. After a brief review of the widely used cryptographic algorithms, we classify the currently known fault injection attacks into low-cost ones (which a single attacker with a modest budget can mount) and high-cost ones (requiring highly skilled attackers with a large budget). We then list the attacks that have been developed for the important and commonly used ciphers and indicate which ones have been successfully used in practice. The known countermeasures against the previously described fault injection attacks are then presented, including intrusion detection and fault detection. We conclude the survey with a discussion on the interaction between fault injection attacks (and the corresponding countermeasures) and power analysis attacks.
引用
收藏
页码:3056 / 3076
页数:21
相关论文
共 84 条
[1]  
Agoyan Michel, 2010, 2010 IEEE 16th International On-Line Testing Symposium (IOLTS 2010), P235, DOI 10.1109/IOLTS.2010.5560194
[2]   Passive and active combined attacks [J].
Amiel, Frederic ;
Villegas, Karine ;
Feix, Benoit ;
Marcel, Louis .
WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY, PROCEEDINGS, 2007, :92-+
[3]  
Amiel F, 2006, LECT NOTES COMPUT SC, V4236, P223
[4]  
[Anonymous], 1997, IEEE STAND INF TE 11
[5]  
[Anonymous], 2009, FIPS1863 NIST
[6]  
[Anonymous], 2001, FIPS-197
[7]  
[Anonymous], 2005, 1803342005 ISOIEC
[8]  
[Anonymous], 2008, P1619 IEEE
[9]  
[Anonymous], 2009, IEEE STAND SPEC PASS
[10]  
[Anonymous], P 5 INT WORKSH SEC P