首页> 外文期刊>IEEE Design & Test of Computers Magazine >Faults, Injection Methods, and Fault Attacks
【24h】

Faults, Injection Methods, and Fault Attacks

机译:故障,注入方法和故障攻击

获取原文
获取原文并翻译 | 示例

摘要

An active attacker can induce errors during the computation of the cryptographic algorithm and exploit the faulty results to extract information about the secret key in embedded systems. We call this kind of attack a fault attack. Fault attacks can break an unprotected system more quickly than any other kind of side-channel attack such as simple power analysis (SPA), differential power analysis (DPA), or electromagnetic analysis (EMA). For example, the attacker can break RSA-CRT (RSA with Chinese Remainder Theorem) with one faulty result, and Data Encryption Standard (DES) and Advanced Encryption Standard (AES) with two. Furthermore, the protection of fault attacks is more costly in terms of chip area. Here, we survey fault injection methods, types of faults, and fault attack models.
机译:主动的攻击者可能会在加密算法的计算过程中引发错误,并利用错误的结果来提取有关嵌入式系统中密钥的信息。我们称这种攻击为故障攻击。与任何其他类型的侧信道攻击(例如简单功率分析(SPA),差分功率分析(DPA)或电磁分析(EMA))相比,故障攻击可以更快地破坏不受保护的系统。例如,攻击者可能以一个错误的结果破解RSA-CRT(具有中国剩余定理的RSA),并以两个错误的结果破解数据加密标准(DES)和高级加密标准(AES)。此外,就芯片面积而言,保护故障攻击的成本更高。在这里,我们调查故障注入方法,故障类型和故障攻击模型。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号