A survey on fault attacks on symmetric key cryptosystems
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
How practical are fault injection attacks, really?
Fault injection attacks (FIA) are a class of active physical attacks, mostly used for malicious
purposes such as extraction of cryptographic keys, privilege escalation, attacks on neural …
purposes such as extraction of cryptographic keys, privilege escalation, attacks on neural …
SNIFF: reverse engineering of neural networks with fault attacks
Neural networks have been shown to be vulnerable against fault injection attacks. These
attacks change the physical behavior of the device during the computation, resulting in a …
attacks change the physical behavior of the device during the computation, resulting in a …
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection
In this work we present a duplex-based authenticated encryption scheme Friet based on a
new permutation called Friet-P. We designed Friet-P with a novel approach for cryptographic …
new permutation called Friet-P. We designed Friet-P with a novel approach for cryptographic …
Fault attacks in symmetric key cryptosystems
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
Compiler-assisted loop hardening against fault attacks
Secure elements widely used in smartphones, digital consumer electronics, and payment
systems are subject to fault attacks. To thwart such attacks, software protections are …
systems are subject to fault attacks. To thwart such attacks, software protections are …
Classical and physical security of symmetric key cryptographic algorithms
A Baksi - 2021 IFIP/IEEE 29th International Conference on Very …, 2021 - ieeexplore.ieee.org
Symmetric key cryptography is one of the cornerstones of security in the modern era of
electronic communication. The symmetric key algorithms, known as the ciphers, are to …
electronic communication. The symmetric key algorithms, known as the ciphers, are to …
Custom instruction support for modular defense against side-channel and fault attacks
The design of software countermeasures against active and passive adversaries is a
challenging problem that has been addressed by many authors in recent years. The …
challenging problem that has been addressed by many authors in recent years. The …
Fault attacks made easy: Differential fault analysis automation on assembly code
Over the past decades, fault injection attacks have been extensively studied due to their
capability to efficiently break cryptographic implementations. Fault injection attack models …
capability to efficiently break cryptographic implementations. Fault injection attack models …
Glitching demystified: analyzing control-flow-based glitching attacks and defenses
Hardware fault injection, or glitching, attacks can compromise the security of devices even
when no software vulnerabilities exist. Attempts to analyze the hardware effects of glitching …
when no software vulnerabilities exist. Attempts to analyze the hardware effects of glitching …