Professional Documents
Culture Documents
Kim 2007
Kim 2007
Kim 2007
544 0740-7475/07/$25.00 G 2007 IEEE Copublished by the IEEE CS and the IEEE CASS IEEE Design & Test of Computers
a call to a subroutine might be skipped, a test might be Static versus computational errors
avoided, different executions might be executed, The attacker can assume it is possible to induce an
a wrong value could be fetched, or a program counter error on memory itself or during the computation of
could be modified. some operations. For example, the attack on RSA-CRT
needs a faulty computation on one of the exponentia-
Models of fault attacks tions. However, a differential fault attack (DFA) on
For a successful fault attack, the attacker must first a digital-signature algorithm (DSA) would require
know which errors to introduce, then try to put those flipping a bit of the secret key stored in memory.
errors into practice. According to the error models, it’s Usually, a computational error is easy to put into
possible to distinguish whether the proposed attack is practice, whereas changing a value stored in memory
practical or not. is difficult.
Bit versus byte errors
Data versus control errors
The attacker can assume it’s possible to change
A control error occurs when some iterations or
a value of one bit or one byte. Usually, a byte error model
operations are skipped because of faults. Normally,
is more practical, because a byte is the basic level for
data errors (such as those on the secret key or
storing data in memory or transferring data on a bus.
intermediate values) are used to attack the cryptosys-
Therefore, it’s easier to change the value of a byte than
tem. Although the induction of a control error is more
that of a bit. Using a bit error model, almost all
difficult, it can be very powerful.
cryptosystems can be broken. However, inducing a bit
error is very difficult with current silicon technology. Chong Hee Kim is a postdoctoral researcher in the Crypto
Group at Université Catholique de Louvain, Belgium. Contact him
Specific versus random value errors at chong-hee.kim@uclouvain.be.
The attacker can assume it’s possible to change the
Jean-Jacques Quisquater is a professor of cryptography
value of data into a specific or random value. Typically, and multimedia security in the Department of Electrical Engineer-
all 0s or 1s are used for the specific values. In general, ing at Université Catholique de Louvain. Contact him at
a random value error is easier to induce. quisquater@dice.ucl.ac.be.
November–December 2007
545