Security

Low Voltage Fault Attacks to AES and RSA on General Purpose Processors

Download Now Free registration required

Executive Summary

Fault injection attacks have proven in recent times a powerful tool to exploit implementative weaknesses of robust cryptographic algorithms. A number of different techniques aimed at disturbing the computation of a cryptographic primitive have been devised, and have been successfully employed to leak secret information inferring it from the erroneous results. In particular, many of these techniques involve directly tampering with the computing device to alter the content of the embedded memory, e.g. through irradiating it with laser beams.

  • Format: PDF
  • Size: 388.8 KB