2014 Workshop on Fault Diagnosis and Tolerance in Cryptography 2014
DOI: 10.1109/fdtc.2014.16
|View full text |Cite
|
Sign up to set email alerts
|

Fault Sensitivity Analysis Meets Zero-Value Attack

Abstract: Abstract-Previous works have shown that the combinatorial path delay of a cryptographic function, e.g., the AES S-box, depends on its input value. Since the relation between critical path delay and input value seems to be relatively random and highly dependent on the routing of the circuit, up to now only template or some collision attacks could reliably extract the used secret key of implementations not protected against fault attacks. Here we present a new attack which is based on the fact that, because of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…Originally, Mischke et al reported that a zero-value attack is applicable not only to DPA, but also to FSA [MMG14]. While their study deals with a multiplicative masking for AES [GT03], our manuscript focuses on Boolean masking.…”
Section: Zero-value Attacks On Compact and Protected S-boxmentioning
confidence: 98%
“…Originally, Mischke et al reported that a zero-value attack is applicable not only to DPA, but also to FSA [MMG14]. While their study deals with a multiplicative masking for AES [GT03], our manuscript focuses on Boolean masking.…”
Section: Zero-value Attacks On Compact and Protected S-boxmentioning
confidence: 98%
“…The attacks monitor the sensitivity information of the design under faults injection to try and reveal information about the circuit. FSA shares similarities with side channel analysis (SCA) attacks and has been recently combined with zero value attacks [17] for greater accuracy. Skorobogatov [18] uses a laser beam to increase the power consumption of a micro-controller logic cell and exploits this phenomenon via power analysis.…”
Section: Dpa and Resistive Bridges Fault Injectionmentioning
confidence: 99%
“…The Hamming Weight model has been used with success [20], but was shown to not work on all S-Boxes [27]. An alternative model based on the zero-value attack was shown successful in the latter cases [22].…”
Section: A Fault Sensitivity Analysismentioning
confidence: 99%
“…In the original work of Li, it was argued that masking schemes could provide resistance against FSA [20]. After several masking schemes were broken using FSA [21], [22], [24], dedicated countermeasures against FSA have been proposed. These can be categorized into gate-level countermeasures and RTL-level countermeasures.…”
Section: Related Workmentioning
confidence: 99%