A survey on fault attacks on symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - ACM Computing Surveys, 2022 - dl.acm.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

FPGAhammer: Remote voltage fault attacks on shared FPGAs, suitable for DFA on AES

J Krautter, DRE Gnad, MB Tahoori - IACR Transactions on …, 2018 - tches.iacr.org
With each new technology generation, the available resources on Field Programmable Gate
Arrays increase, making them more attractive for partial access from multiple users. They get …

Fault sensitivity analysis

Y Li, K Sakiyama, S Gomisawa, T Fukunaga… - … and Embedded Systems …, 2010 - Springer
This paper proposes a new fault-based attack called the Fault Sensitivity Analysis (FSA)
attack, which unlike most existing fault-based analyses including Differential Fault Analysis …

Security analysis of concurrent error detection against differential fault analysis

X Guo, D Mukhopadhyay, C **, R Karri - Journal of Cryptographic …, 2015 - Springer
Differential fault analysis (DFA) poses a significant threat to advanced encryption standard
(AES). Only a single faulty ciphertext is required to extract the secret key. Concurrent error …

Glitch and laser fault attacks onto a secure AES implementation on a SRAM-based FPGA

G Canivet, P Maistri, R Leveugle, J Clédière… - Journal of …, 2011 - Springer
Programmable devices are an interesting alternative when implementing embedded
systems on a low-volume scale. In particular, the affordability and the versatility of SRAM …

BCDL: A high speed balanced DPL for FPGA with global precharge and no early evaluation

M Nassar, S Bhasin, JL Danger, G Duc… - … Design, Automation & …, 2010 - ieeexplore.ieee.org
In this paper, we present BCDL (Balanced Cell-based Dual-rail Logic), a new counter-
measure against Side Channel Attacks (SCA) on cryptoprocessors implementing …

Review of gate‐level differential power analysis and fault analysis countermeasures

H Marzouqi, M Al‐Qutayri, K Salah - IET Information Security, 2014 - Wiley Online Library
Hardware implementation of modern crypto devices paves the way for a special type of
cryptanalysis, which is known as side channel analysis (SCA) attacks. These attacks are …

Fault attacks in symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

A 100-Gbps Fault-Injection Attack-Resistant AES-256 Engine With 99.1%–99.99% Error Coverage in Intel 4 CMOS

R Kumar, AL Varna, C Tokunaga… - IEEE Journal of Solid …, 2023 - ieeexplore.ieee.org
Fault-injection (FI) attacks exploit corrupted ciphertexts from cryptographic hardware to
extract the embedded secret key using directed laser pulses or voltage/clock glitches. Laser …

Overview of dual rail with precharge logic styles to thwart implementation-level attacks on hardware cryptoprocessors

JL Danger, S Guilley, S Bhasin… - 2009 3rd International …, 2009 - ieeexplore.ieee.org
The security of cryptographic implementations relies not only on the algorithm quality but
also on the countermeasures to thwart attacks aiming at disclosing the secrecy. These …