首页> 外文期刊>IEEE Design & Test of Computers Magazine >Faults, Injection Methods, and Fault Attacks
【24h】

Faults, Injection Methods, and Fault Attacks

机译:故障,注射方法和故障攻击

获取原文
获取原文并翻译 | 示例

摘要

An active attacker can induce errors during the computation of the cryptographic algorithm and exploit the faulty results to extract information about the secret key in embedded systems. We call this kind of attack a fault attack. Fault attacks can break an unprotected system more quickly than any other kind of side-channel attack such as simple power analysis (SPA), differential power analysis (DPA), or electromagnetic analysis (EMA). For example, the attacker can break RSA-CRT (RSA with Chinese Remainder Theorem) with one faulty result, and Data Encryption Standard (DES) and Advanced Encryption Standard (AES) with two. Furthermore, the protection of fault attacks is more costly in terms of chip area. Here, we survey fault injection methods, types of faults, and fault attack models.
机译:活动攻击者可以在加密算法的计算期间引起错误,并利用故障结果以提取有关嵌入式系统中的密钥的信息。我们称这种攻击发生故障攻击。故障攻击可以比任何其他类型的侧频攻击更快地打破一个未受保护的系统,例如简单的功率分析(SPA),差分功率分析(DPA)或电磁分析(EMA)。例如,攻击者可以用一个故障结果将RSA-CRT(RSA与中国剩余定理)打破,以及数据加密标准(DES)和高级加密标准(AES)。此外,在芯片面积方面,对故障攻击的保护更昂贵。在这里,我们调查故障注入方法,故障类型和故障攻击模型。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号