Paper 2011/531

Static Fault Attacks on Hardware DES Registers

Philippe Loubet-Moundi, David Vigilant, and Francis Olivier

Abstract

In the late nineties, Eli Biham and Adi Shamir published the first paper on Differential Fault Analysis on symmetric key algorithms. More specifically they introduced a fault model where a key bit located in non-volatile memory is forced to $0/1$ with a fault injection. In their scenario the fault was permanent, and could lead the attacker to full key recovery with low complexity. In this paper, another fault model is considered: forcing a key bit to $0/1$ in the register of a hardware block implementing Data Encryption Standard. Due to the specific location of the fault, the key modification is not permanent in the life of the embedded device, and this leads to apply a powerful safe-error like attack. This paper reports a practical validation of the fault model on two actual circuits, and discusses limitations and efficient countermeasures against this threat.

Note: Give the exact reference to patent (old reference [16])

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Unknown where it was published
Keywords
Hardware DESfault attackssafe-errorregister attacks
Contact author(s)
philippe loubet-moundi @ gemalto com
History
2011-10-05: revised
2011-10-01: received
See all versions
Short URL
https://ia.cr/2011/531
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2011/531,
      author = {Philippe Loubet-Moundi and David Vigilant and Francis Olivier},
      title = {Static Fault Attacks on Hardware DES Registers},
      howpublished = {Cryptology ePrint Archive, Paper 2011/531},
      year = {2011},
      note = {\url{https://eprint.iacr.org/2011/531}},
      url = {https://eprint.iacr.org/2011/531}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.