Jörn-Marc Schmidt joern-marc.schmidt@iaik.tugraz.at
• Introduction and Adversaries • Attack Setups • Attacks in Theory • Example: Square and Multiply • Combined Attacks • Conclusion, Outlook
• Fault Type – Transient – Permanent – Destructive • Timing • Precision (Bit, Byte, Word) • Set, Flip, Program Flow..
Class I Clever Outsider Class II Knowledgeable Insider Class III Funded Company
Manipulation of: – Loops – Checks
0 0 R
• Fault attacks are powerful • Possible attacks depend on adversary • Not only on cryptographic blocks • Combined attacks
Recommend
More recommend