Paper 2011/531

Static Fault Attacks on Hardware DES Registers

Philippe Loubet-Moundi, David Vigilant, and Francis Olivier


In the late nineties, Eli Biham and Adi Shamir published the first paper on Differential Fault Analysis on symmetric key algorithms. More specifically they introduced a fault model where a key bit located in non-volatile memory is forced to $0/1$ with a fault injection. In their scenario the fault was permanent, and could lead the attacker to full key recovery with low complexity. In this paper, another fault model is considered: forcing a key bit to $0/1$ in the register of a hardware block implementing Data Encryption Standard. Due to the specific location of the fault, the key modification is not permanent in the life of the embedded device, and this leads to apply a powerful safe-error like attack. This paper reports a practical validation of the fault model on two actual circuits, and discusses limitations and efficient countermeasures against this threat.

Note: Give the exact reference to patent (old reference [16])

Available format(s)
Publication info
Published elsewhere. Unknown where it was published
Hardware DESfault attackssafe-errorregister attacks
Contact author(s)
philippe loubet-moundi @ gemalto com
2011-10-05: revised
2011-10-01: received
See all versions
Short URL
Creative Commons Attribution


      author = {Philippe Loubet-Moundi and David Vigilant and Francis Olivier},
      title = {Static Fault Attacks on Hardware DES Registers},
      howpublished = {Cryptology ePrint Archive, Paper 2011/531},
      year = {2011},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.