Optical Fault Injection Attacks against Cipher Chip

Article Preview

Abstract:

Cipher chips, such as microprocessors, are playing the important role in most cryptosystems, and implementing many public cryptographic algorithms. However, Side channel attacks pose serious threats to Cipher chips. Optical Side channel attack is a new kind of method against cipher chips. Two methods are presented in this paper, which shows how to implement optical fault injection attacks against RSA and AES algorithms running on AT89C52 microchip, and demonstrates how to exploit secret information under attack.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 1044-1045)

Pages:

1498-1502

Citation:

Online since:

October 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] PAUL C KOCHER, JOSHUA JAFFE, and BENJAMIN JUN. Differential Power Analysis: 19th Annual International Cryptology Conference[C]. California: Advances in Cryptology, 1999, 388–397.

DOI: 10.1007/3-540-48405-1_25

Google Scholar

[2] Quisquater, J.J., Samyde, D.: Electromagnetic analysis (EMA): Measures and counter-measures for smart cards. In: E-smart. p.2001, 200-210.

DOI: 10.1007/3-540-45418-7_17

Google Scholar

[3] KarineGandolfi, Christophe Mourtel, and Francis Olivier. Electromagnetic Analysis: Concrete Results. In Cryptographic Hardware and Embedded Systems - CHES2001, Third International Workshop, pages 2001, 251-261.

DOI: 10.1007/3-540-44709-1_21

Google Scholar

[4] Paul Kocher, Timing Attack on Implementation of Diffe-Hellman, RSA, DSS and other Systems, " Advances in Cryptology; proceedings of Crypto , 96. New York, Springer-Verlag, (1996).

DOI: 10.1007/3-540-68697-5_9

Google Scholar

[5] CHEN Cai-sen, WANG Tao, ZHENG Yuan-yuan. Timing Attacks and Defenses on RSA Public-key Algorithms[J], Computer engineering, 2009, 35(2): 123-125.

Google Scholar

[6] Korobogatov S. Semi-invasive attacks -a new approach to hardware security analysis[D]. London: University of Cambridge, Computer Laboratory, April (2005).

Google Scholar

[7] S. Skorobogatov, R. Anderson, Optical Fault Induction Attacks, Cryptographic Hardware and Embedded Systems Workshop, California, (2002).

DOI: 10.1007/3-540-36400-5_2

Google Scholar

[8] Dan Boneh, Richard A. DeMillo, and Richard J. Lipton, On the Importance of Checking Cryptographic Protocols for Faults, International Conference on the Theory and Application of Cryptographic Techniques, onstanz, (1997).

DOI: 10.1007/3-540-69053-0_4

Google Scholar