Results 21 to 30 of about 3,574 (299)

Redshift: Manipulating Signal Propagation Delay via Continuous-Wave Lasers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
We propose a new laser injection attack Redshift that manipulates signal propagation delay, allowing for precise control of oscillator frequencies and other behaviors in delay-sensitive circuits.
Kohei Yamashita   +4 more
doaj   +3 more sources

Analysis of an Optimal Fault Attack on the LED-64 Lightweight Cryptosystem

open access: yesIEEE Access, 2019
This paper presents an optimal method for recovering the secret keys of the light encryption device (LED) by combining the impossible differential fault attack with the algebraic differential fault attack. The proposed optimal method effectively improves
Liang Dong   +5 more
doaj   +1 more source

Research on co-design of dual security control and communication for nonlinear CPS with actuator fault and FDI attacks

open access: yesMeasurement + Control, 2022
In this study, a co-design method of dual security control and communication is investigated for a nonlinear cyber–physical system (CPS) with an actuator fault and false data injection (FDI) attacks.
Li Zhao, Wei Li, YaJie Li
doaj   +1 more source

Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures [PDF]

open access: yesProceedings of the IEEE, 2012
Implementations of cryptographic algorithms continue to proliferate in consumer products due to the increasing demand for secure transmission of confidential information. Although the current standard cryptographic algorithms proved to withstand exhaustive attacks, their hardware and software implementations have exhibited vulnerabilities to side ...
BARENGHI, ALESSANDRO   +3 more
openaire   +3 more sources

Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
At SAC 2016, Espitau et al. presented a loop-abort fault attack against lattice-based signature schemes following the Fiat–Shamir with aborts paradigm.
Vincent Quentin Ulitzsch   +4 more
doaj   +1 more source

Voltage Fault Injection Attack on Key Expansion of AES [PDF]

open access: yesJisuanji gongcheng, 2019
Aiming at the Advanced Encryption Standard(AES) algorithm,this paper proposes a simple and efficient method of fault injection attack.By instantaneously reducing the voltage of the cipher chip power supply,the low voltage burr is generated,which causes ...
DUAN Xiaoyi, TIAN Lina, ZHANG Lei, WANG Jianxin, LI Xiuying, ZHANG Kaijian
doaj   +1 more source

Detecting Fault Injection Attacks with Runtime Verification [PDF]

open access: yesProceedings of the 3rd ACM Workshop on Software Protection, 2019
Fault injections are increasingly used to attack/test secure applications. In this paper, we define formal models of runtime monitors that can detect fault injections that result in test inversion attacks and arbitrary jumps in the control flow. Runtime verification monitors offer several advantages. The code implementing a monitor is small compared to
Kassem, Ali, Falcone, Yliès
openaire   +3 more sources

Roulette: A Diverse Family of Feasible Fault Attacks on Masked Kyber

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
At Indocrypt 2021, Hermelink, Pessl, and Pöppelmann presented a fault attack against Kyber in which a system of linear inequalities over the private key is generated and solved.
Jeroen Delvaux
doaj   +3 more sources

Evolving genetic algorithms for fault injection attacks

open access: yes2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2014
Genetic algorithms are used today to solve numerous difficult problems. However, it is often needed to specialize and adapt them further in order to successfully tackle some specific problem. One such example is the fault injection attack where the goal is to find a specific set of parameters that can lead to a successful cryptographic attack in a ...
Picek, Stjepan   +3 more
openaire   +4 more sources

A Fault Attack on the Family of Enocoro Stream Ciphers

open access: yesCryptography, 2021
A differential fault attack framework for the Enocoro family of stream ciphers is presented. We only require that the attacker can reset the internal state and inject a random byte-fault, in a random register, during a known time period.
Julian Danner, Martin Kreuzer
doaj   +1 more source

Home - About - Disclaimer - Privacy