Title :
Checking before output may not be enough against fault-based cryptanalysis
Author :
Yen, Sung-Ming ; Joye, Marc
Author_Institution :
Lab. of Cryptography & Inf. Security, Nat. Central Univ., Chung-Li, Taiwan
fDate :
9/1/2000 12:00:00 AM
Abstract :
In order to avoid fault-based attacks on cryptographic security modules (e.g., smart-cards), some authors suggest that the computation results should be checked for faults before being transmitted. In this paper, we describe a potential fault-based attack where key bits leak only through the information whether the device produces a correct answer after a temporary fault or not. This information is available to the adversary even if a check is performed before output
Keywords :
cryptography; cryptographic security modules; fault-based attack; fault-based attacks; fault-based cryptanalysis; smart-cards; Cryptography; Data security; EPROM; Embedded computing; Information security; Plastics; Protection; Read only memory; Read-write memory; Remanence;
Journal_Title :
Computers, IEEE Transactions on