The Community for Technology Leaders
Green Image
Issue No. 06 - November-December (2007 vol. 24)
ISSN: 0740-7475
pp: 544-545
Chong Hee Kim , Université Catholique de Louvain
Jean-Jacques Quisquater , Université Catholique de Louvain
In a fault attack, errors are induced during the computation of a cryptographic algorithm, and the faulty results are exploited to extract information about the secret key in embedded systems. Fault attacks can break an unprotected system more quickly than any other kind of side-channel attack. Furthermore, protecting against fault attacks is more costly in terms of chip area. This sidebar surveys fault injection methods, types of faults, and fault attack models.
fault, fault injection, fault attack, cryptographic algorithm

C. H. Kim and J. Quisquater, "Faults, Injection Methods, and Fault Attacks," in IEEE Design & Test of Computers, vol. 24, no. , pp. 544-545, 2007.
92 ms
(Ver 3.3 (11022016))