Paper 2022/865
Linked Fault Analysis
Abstract
Numerous fault models have been developed, each with distinct characteristics and effects. These models should be evaluated in light of their costs, repeatability, and practicability. Moreover, there must be effective ways to use the injected fault to retrieve the secret key, especially if there are some countermeasures in the implementation. In this paper, we introduce a new fault analysis technique called ``linked fault analysis'' (LFA), which can be viewed as a more powerful version of well-known fault attacks against implementations of symmetric primitives in various circumstances, especially software implementations. For known fault analyses, the bias over the faulty value or the relationship between the correct value and the faulty one, both produced by the fault injection serve as the foundations for the fault model. In the LFA, however, a single fault involves two intermediate values. The faulty target variable,
Metadata
- Available format(s)
-
PDF
- Category
- Attacks and cryptanalysis
- Publication info
- Published elsewhere. IEEE Transactions on Information Forensics and Security
- DOI
- 10.1109/TIFS.2023.3327658
- Keywords
- Fault AnalysisLinked Fault
- Contact author(s)
-
beigizad @ yahoo com
hadi soleimany @ gmail com
sarazareei 94 @ gmail com
hamedramzanipour97 @ gmail com - History
- 2023-11-14: last of 3 revisions
- 2022-07-01: received
- See all versions
- Short URL
- https://ia.cr/2022/865
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2022/865, author = {Ali Asghar Beigizad and Hadi Soleimany and Sara Zarei and Hamed Ramzanipour}, title = {Linked Fault Analysis}, howpublished = {Cryptology {ePrint} Archive, Paper 2022/865}, year = {2022}, doi = {10.1109/TIFS.2023.3327658}, url = {https://eprint.iacr.org/2022/865} }