A survey on fault attacks on symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - ACM Computing Surveys, 2022 - dl.acm.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

CINI MINIS: domain isolation for fault and combined security

J Feldtkeller, J Richter-Brockmann, P Sasdrich… - Proceedings of the …, 2022 - dl.acm.org
Observation and manipulation of physical characteristics are well-known and powerful
threats to cryptographic devices. While countermeasures against passive side-channel and …

Revisiting fault adversary models–hardware faults in theory and practice

J Richter-Brockmann, P Sasdrich… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Fault injection attacks are considered as powerful techniques to successfully attack
embedded cryptographic implementations since various fault injection mechanisms from …

VERICA-Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering

J Richter-Brockmann, J Feldtkeller, P Sasdrich… - Cryptology ePrint …, 2022 - eprint.iacr.org
Physical attacks, including passive Side-Channel Analysis and active Fault Injection
Analysis, are considered among the most powerful threats against physical cryptographic …

Fault attacks in symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

Learn from your faults: leakage assessment in fault attacks using deep learning

S Saha, M Alam, A Bag, D Mukhopadhyay… - Journal of …, 2023 - Springer
Generic vulnerability assessment of cipher implementations against Fault Attacks (FA) is a
largely unexplored research area. Security assessment against FA is critical for FA …

Non-profiled side-channel assisted fault attack: A case study on domrep

S Saha, P Ravi, D Jap, S Bhasin - 2023 Design, Automation & …, 2023 - ieeexplore.ieee.org
Recent work has shown that Side-Channel Attacks (SCA) and Fault Attacks (FA) can be
combined, forming an extremely powerful adversarial model, which can bypass even some …

Statistical effective fault attacks: the other side of the coin

N Vafaei, S Zarei, N Bagheri… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
The introduction of Statistical Ineffective Fault Attacks (SIFA) has led to a renewed interest in
fault attacks. SIFA requires minimal knowledge of the concrete implementation and is …

Challenges and opportunities of security-aware EDA

J Feldtkeller, P Sasdrich, T Güneysu - ACM Transactions on Embedded …, 2023 - dl.acm.org
The foundation of every digital system is based on hardware in which security, as a core
service of many applications, should be deeply embedded. Unfortunately, the knowledge of …

Classical and physical security of symmetric key cryptographic algorithms

A Baksi - 2021 IFIP/IEEE 29th International Conference on Very …, 2021 - ieeexplore.ieee.org
Symmetric key cryptography is one of the cornerstones of security in the modern era of
electronic communication. The symmetric key algorithms, known as the ciphers, are to …