2020
DOI: 10.1007/s13389-020-00234-7
|View full text |Cite
|
Sign up to set email alerts
|

Error control scheme for malicious and natural faults in cryptographic modules

Abstract: Today’s electronic systems must simultaneously fulfill strict requirements on security and reliability. In particular, their cryptographic modules are exposed to faults, which can be due to natural failures (e.g., radiation or electromagnetic noise) or malicious fault-injection attacks. We present an architecture based on a new class of error-detecting codes that combine robustness properties with a minimal distance. The new architecture guarantees (with some probability) the detection of faults injected by an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 30 publications
(61 reference statements)
0
0
0
Order By: Relevance
“…The class of attacks that exploit the physical properties and peculiar properties of system architecture is called side-channel attacks [3]. Side-channel attacks are one of the most effective ways to breach the security of information, this class of attacks uses vulnerabilities in the implementation of the algorithm to obtain secrets [3][4][5]. Analysis of system behavior in case of its incorrect work can give to an attacker a great advantage and valuable information [3][4][5].…”
Section: Introductionmentioning
confidence: 99%
“…The class of attacks that exploit the physical properties and peculiar properties of system architecture is called side-channel attacks [3]. Side-channel attacks are one of the most effective ways to breach the security of information, this class of attacks uses vulnerabilities in the implementation of the algorithm to obtain secrets [3][4][5]. Analysis of system behavior in case of its incorrect work can give to an attacker a great advantage and valuable information [3][4][5].…”
Section: Introductionmentioning
confidence: 99%