SoK: Fault Injection Attacks on Cryptosystems

dc.contributor.authorChiu, Tinghungen
dc.contributor.authorXiong, Wenjieen
dc.date.accessioned2023-11-02T13:07:47Zen
dc.date.available2023-11-02T13:07:47Zen
dc.date.issued2023-10-29en
dc.date.updated2023-11-01T08:01:49Zen
dc.description.abstractFault injection attacks are a powerful technique that intentionally induces faults during cryptographic computations to leak secret information. This paper provides a survey of fault attack techniques on different cryptosystems. The fault attack consists of two main components: fault modeling, which examines methods for injecting faults in a target device, and fault analysis, which analyzes the resulting faulty outputs to deduce secrets in each cryptosystem. We first categorize various fault attack methods by fault model and fault analysis.We then give examples of the various fault attacks on symmetric key cryptosystems and public key cryptosystems. This paper aims to provide a background on fault attack research and directions for further study on securing real-world cryptosystems against fault injection attacks.en
dc.description.versionPublished versionen
dc.format.mimetypeapplication/pdfen
dc.identifier.doihttps://doi.org/10.1145/3623652.3623671en
dc.identifier.urihttp://hdl.handle.net/10919/116620en
dc.language.isoenen
dc.publisherACMen
dc.rightsCreative Commons Attribution-NonCommercial-ShareAlike 4.0 Internationalen
dc.rights.holderThe author(s)en
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en
dc.titleSoK: Fault Injection Attacks on Cryptosystemsen
dc.typeArticle - Refereeden
dc.type.dcmitypeTexten

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
3623652.3623671.pdf
Size:
975.88 KB
Format:
Adobe Portable Document Format
Description:
Published version
License bundle
Now showing 1 - 1 of 1
Name:
license.txt
Size:
0 B
Format:
Item-specific license agreed upon to submission
Description: