DOI: 10.29007/w37p
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Correction of Malicious and Natural Faults in Cryptographic Modules

Abstract: Today's electronic systems must simultaneously fulfill strict requirements on security and reliability. In particular, their cryptographic modules are exposed to faults, which can be due to natural failures (e.g., radiation or electromagnetic noise) or malicious faultinjection attacks. We present an architecture based on a new class of error-detecting codes that combine robustness properties with a minimal distance. The new architecture guarantees (with some probability) the detection of faults injected by an … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Publication Types

Select...
4
1
1

Relationship

3
3

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…4. We can now calculate e i = s j g i = 14 and the corre- 13,14,13,12,4,15,14,4,11,3] We have successfully corrected the single error.…”
Section: Detection and Correction Architecture For Rk Codes Of Distanmentioning
confidence: 99%
“…4. We can now calculate e i = s j g i = 14 and the corre- 13,14,13,12,4,15,14,4,11,3] We have successfully corrected the single error.…”
Section: Detection and Correction Architecture For Rk Codes Of Distanmentioning
confidence: 99%
“…To integrate FIA detection into the same DFX infrastructure seems only logical. However, distinguishing between natural and malicious faults is non-trivial [59], and the responses should be different: fastest possible recovery and resumption of regular operation upon a natural fault, but re-keying or even discontinuation of service upon a tampering attempt. Therefore, future security-aware DFX infrastructures should enable such distinction.…”
Section: F Security-driven Testingmentioning
confidence: 99%
“…Countermeasures include detection of faults at runtime, e.g., see [20], and hardening against fault injection at design and manufacturing time, e.g., see [21,22]. Note that distinguishing between natural and malicious faults is non-trivial [23], which imposes practical challenges for recovery at runtime.…”
Section: Introductionmentioning
confidence: 99%