Paper 2012/123

Injection of transient faults using electromagnetic pulses -Practical results on a cryptographic system-

A. Dehbaoui, J. M. Dutertre, B. Robisson, P. Orsatelli, P. Maurine, and A. Tria

Abstract

This article considers the use of magnetic pulses to inject transient faults into the calculations of a RISC micro-controller running the AES algorithm. A magnetic coil is used to generate the pulses. It induces computational faults without any physical contact with the device. The injected faults are proved to be constant (i.e. data independent) under certain experimental conditions. This behaviour, combined with the ability to choose the faulted bytes thanks to timing accuracy in the fault injection process, makes it possible to implement most of the state-of-the-art fault attack schemes.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Unknown where it was published
Keywords
AESFault AttackElectro-Magnetic Pulse
Contact author(s)
amine dehbaoui @ gmail com
History
2012-03-13: received
Short URL
https://ia.cr/2012/123
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2012/123,
      author = {A.  Dehbaoui and J. M.  Dutertre and B.  Robisson and P.  Orsatelli and P.  Maurine and A.  Tria},
      title = {Injection of transient faults using electromagnetic pulses -Practical results on a cryptographic system-},
      howpublished = {Cryptology ePrint Archive, Paper 2012/123},
      year = {2012},
      note = {\url{https://eprint.iacr.org/2012/123}},
      url = {https://eprint.iacr.org/2012/123}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.