Side channel attacks represent a prime threat to the security of modern digital electronic systems. Among the different attack strategies, exploiting the information leaked by the resiliency of the device to harsh working conditions has recently emerged as an exploitable mean to retrieve secret keys held in a secure device. In this chapter we will provide an introduction to the Fault Sensitivity Analysis (FSA) attack technique, together with a design time evaluation of it on two different AES S-Boxes designs. Since a critical point of performing an FSA based attack is to choose a proper model for the expected failure trend of the device, we will delineate two different approaches, one based on an a-priori modeling of it, while the other exploits an a-posteriori strategy.
Fault Sensitivity Analysis at Design Time
BARENGHI, ALESSANDRO;BREVEGLIERI, LUCA ODDONE;PALOMBA, ANDREA;PELOSI, GERARDO
2015-01-01
Abstract
Side channel attacks represent a prime threat to the security of modern digital electronic systems. Among the different attack strategies, exploiting the information leaked by the resiliency of the device to harsh working conditions has recently emerged as an exploitable mean to retrieve secret keys held in a secure device. In this chapter we will provide an introduction to the Fault Sensitivity Analysis (FSA) attack technique, together with a design time evaluation of it on two different AES S-Boxes designs. Since a critical point of performing an FSA based attack is to choose a proper model for the expected failure trend of the device, we will delineate two different approaches, one based on an a-priori modeling of it, while the other exploits an a-posteriori strategy.File | Dimensione | Formato | |
---|---|---|---|
Barenghi2015_Chapter_FaultSensitivityAnalysisAtDesi.pdf
Accesso riservato
:
Publisher’s version
Dimensione
565.6 kB
Formato
Adobe PDF
|
565.6 kB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.