By Topic

Fault Diagnosis and Tolerance in Cryptography (FDTC), 2009 Workshop on

Date 6-6 Sept. 2009

Filter Results

Displaying Results 1 - 23 of 23
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (138 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (10 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (398 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2009, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (61 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2009
    Request permission for commercial reuse | PDF file iconPDF (75 KB)
    Freely Available from IEEE
  • Blinded Fault Resistant Exponentiation Revisited

    Publication Year: 2009, Page(s):3 - 9
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    Cryptographic algorithm implementations are subject to specific attacks, called side channel attacks, focusing on the analysis of their power consumption or execution time or on the analysis of faulty computations. At FDTC06, Fumaroli and Vigilant presented a generic method to compute an exponentiation resistant against different side channel attacks. However, even if this algorithm does not revea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optical Fault Attacks on AES: A Threat in Violet

    Publication Year: 2009, Page(s):13 - 22
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (969 KB) | HTML iconHTML

    Microprocessors are the heart of the devices we rely on every day. However, their non-volatile memory, which often contains sensitive information, can be manipulated by ultraviolet (UV) irradiation. This paper gives practical results demonstrating that the non-volatile memory can be erased with UV light by investigating the effects of UV-Clight with a wavelength of 254 nm on four different depacka... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low Voltage Fault Attacks on the RSA Cryptosystem

    Publication Year: 2009, Page(s):23 - 31
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    Fault injection attacks are a powerful tool to exploit implementative weaknesses of robust cryptographic algorithms. The faults induced during the computation of the cryptographic primitives allow to extract pieces of information about the secret parameters stored into the device using the erroneous results. Various fault induction techniques have been researched, both to make practical several th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault Attack on Schnorr Based Identification and Signature Schemes

    Publication Year: 2009, Page(s):32 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    In this paper, we study the security of Schnorr based identification and signature schemes. Like the carry attack of Fouque et al. at CHES last year, we exploit the carry knowledge from fault attack on other public-key schemes like DSA and other ECDSA signature scheme, Schnorr and GPS authentication and signature schemes. These attacks can be used to recover very efficiently the secret key and it ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protecting RSA against Fault Attacks: The Embedding Method

    Publication Year: 2009, Page(s):41 - 45
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Fault attacks constitute a major threat toward cryptographic products supporting RSA-based technologies. Most often, the public exponent is unknown, turning resistance to fault attacks into an intricate problem. Over the past few years, several techniques for secure implementations have been published, but none of them is fully satisfactory. We propose a completely different approach by embedding ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing the Elliptic Curve Montgomery Ladder against Fault Attacks

    Publication Year: 2009, Page(s):46 - 50
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    The Montgomery ladder method of computing elliptic curve scalar multiplication is esteemed as an efficient algorithm, inherently resistant to simple side-channel attacks as well as to various fault attacks. In FDTC 08, Fouque et al. present an attack on the Montgomery ladder in the presence of a point validation countermeasure, when the y-coordinate is not used. In this paper, we present an effici... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing AES Implementation against Fault Attacks

    Publication Year: 2009, Page(s):51 - 62
    Cited by:  Papers (5)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (370 KB) | HTML iconHTML

    On smart card environment, speed and memory optimization of cryptographic algorithms are an ongoing preoccupation. In addition, there is the necessity to protect the device against various attacks. In this paper we present a fault attack detection scheme for the AES using digest values. They are deduced from the mathematical description of each AES individual transformation. The security of our co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • KeeLoq and Side-Channel Analysis-Evolution of an Attack

    Publication Year: 2009, Page(s):65 - 69
    Cited by:  Papers (8)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (261 KB) | HTML iconHTML

    Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control purposes such as garage openers or car door systems. Even though the attack seems almost straightforward in hindsight, there where many practical and theoretical problems to overcome. In this talk I want to describe the evolut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WDDL is Protected against Setup Time Violation Attacks

    Publication Year: 2009, Page(s):73 - 83
    Cited by:  Papers (16)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (563 KB) | HTML iconHTML

    In order to protect crypto-systems against side channel attacks various countermeasures have been implemented such as dual-rail logic or masking. Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES and DES. Various kind of fault attacks scenarios have been published. However, very few publications available in the public literature detail... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical Fault Attack on a Cryptographic LSI with ISO/IEC 18033-3 Block Ciphers

    Publication Year: 2009, Page(s):84 - 92
    Cited by:  Papers (19)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB) | HTML iconHTML

    This paper presents practical fault attack results on six kinds of block ciphers listed in ISO/IEC 18033-3 that are implemented on an LSI: AES, DES, Camellia, CAST-128, SEED, and MISTY1. We developed an experimental environment that injects faults into any desired round by supplying a clock signal with a glitch. We examined practical attack assumptions and the fault model based on experimental res... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fault Attack on ECDSA

    Publication Year: 2009, Page(s):93 - 99
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    An advantage of schemes based on elliptic curve cryptography (ECC) is that they require a smaller key size than other public key schemes to guarantee the same level of security. Thus, ECC algorithms are well suited for systems with constrained resources like smart cards or mobile devices. When evaluating those devices, not only the security from a theoretical point of view, but also implementation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault Analysis of the Stream Cipher Snow 3G

    Publication Year: 2009, Page(s):103 - 110
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    Snow 3G is the backup encryption algorithm used in the mobile phone UMTS technology to ensure data confidentiality. Its design - a combiner with memory - is derived from the stream cipher Snow 2.0, with improvements against algebraic cryptanalysis and distinguishing attacks. No attack is known against Snow 3G today. In this paper, a fault attack against Snow 3G is proposed. Our attack recovers the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Optical Emission Analysis for Estimating Contribution to Power Analysis

    Publication Year: 2009, Page(s):111 - 119
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1704 KB) | HTML iconHTML

    This paper shows that optical emissions from an operating chip have a good correlation with power traces and can therefore be used to estimate the contribution of different areas within the chip. I present a low-cost approach using inexpensive CCD cameras. The technique was used to recover data stored in SRAM, EEPROM and flash of a 0.9 ¿m microcontroller. The result of a backside approach in anal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Differential Fault Analysis on SHACAL-1

    Publication Year: 2009, Page(s):120 - 126
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    SHACAL-1, known as one of the finalists of the NESSIE project, originates from the compression component of the widely used hash function SHA-1. The requirements of confusion and diffusion are implemented through mixing operations and rotations other than substitution and permutation, thus there exists little literature on its immunity against fault attacks. In this paper, we apply differential fa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2009, Page(s): 127
    Request permission for commercial reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • [Publisher's information]

    Publication Year: 2009, Page(s): 128
    Request permission for commercial reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE