Paper 2011/531
Static Fault Attacks on Hardware DES Registers
Philippe Loubet-Moundi, David Vigilant, and Francis Olivier
Abstract
In the late nineties, Eli Biham and Adi Shamir published the first paper on Differential Fault Analysis on symmetric key algorithms. More specifically they introduced a fault model where a key bit located in non-volatile memory is forced to $0/1$ with a fault injection. In their scenario the fault was permanent, and could lead the attacker to full key recovery with low complexity. In this paper, another fault model is considered: forcing a key bit to $0/1$ in the register of a hardware block implementing Data Encryption Standard. Due to the specific location of the fault, the key modification is not permanent in the life of the embedded device, and this leads to apply a powerful safe-error like attack. This paper reports a practical validation of the fault model on two actual circuits, and discusses limitations and efficient countermeasures against this threat.
Note: Give the exact reference to patent (old reference [16])
Metadata
- Available format(s)
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- Hardware DESfault attackssafe-errorregister attacks
- Contact author(s)
- philippe loubet-moundi @ gemalto com
- History
- 2011-10-05: revised
- 2011-10-01: received
- See all versions
- Short URL
- https://ia.cr/2011/531
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2011/531, author = {Philippe Loubet-Moundi and David Vigilant and Francis Olivier}, title = {Static Fault Attacks on Hardware {DES} Registers}, howpublished = {Cryptology {ePrint} Archive, Paper 2011/531}, year = {2011}, url = {https://eprint.iacr.org/2011/531} }