...
首页> 外文期刊>Proceedings of the IEEE >Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures
【24h】

Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures

机译:对密码设备的故障注入攻击:理论,实践和对策

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Implementations of cryptographic algorithms continue to proliferate in consumer products due to the increasing demand for secure transmission of confidential information. Although the current standard cryptographic algorithms proved to withstand exhaustive attacks, their hardware and software implementations have exhibited vulnerabilities to side channel attacks, e.g., power analysis and fault injection attacks. This paper focuses on fault injection attacks that have been shown to require inexpensive equipment and a short amount of time. The paper provides a comprehensive description of these attacks on cryptographic devices and the countermeasures that have been developed against them. After a brief review of the widely used cryptographic algorithms, we classify the currently known fault injection attacks into low-cost ones (which a single attacker with a modest budget can mount) and high-cost ones (requiring highly skilled attackers with a large budget). We then list the attacks that have been developed for the important and commonly used ciphers and indicate which ones have been successfully used in practice. The known countermeasures against the previously described fault injection attacks are then presented, including intrusion detection and fault detection. We conclude the survey with a discussion on the interaction between fault injection attacks (and the corresponding countermeasures) and power analysis attacks.
机译:由于对安全传输机密信息的需求不断增加,密码算法的实现在消费产品中继续激增。尽管当前的标准密码算法被证明可以抵抗详尽的攻击,但是它们的硬件和软件实现却表现出了对侧信道攻击(例如功率分析和故障注入攻击)的脆弱性。本文重点介绍了故障注入攻击,这些攻击已被证明需要廉价的设备和较短的时间。本文提供了对加密设备的这些攻击的全面描述,以及针对它们的对策。在简要回顾了广泛使用的密码算法之后,我们将当前已知的故障注入攻击分为低成本攻击(只有一个预算适中的单个攻击者可以安装)和高成本攻击(需要拥有大量预算的高技能攻击者) )。然后,我们列出针对重要和常用密码而开发的攻击,并指出在实践中已成功使用的密码。然后介绍了针对先前描述的故障注入攻击的已知对策,包括入侵检测和故障检测。在总结调查时,我们将讨论故障注入攻击(以及相应的对策)与功率分析攻击之间的相互作用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号