A method for optimal value measurement of some parameters of fault attacks on cryptographic algorithms
Diskretnyj analiz i issledovanie operacij, Tome 31 (2024) no. 2, pp. 96-107 Cet article a éte moissonné depuis la source Math-Net.Ru

Voir la notice de l'article

This paper is devoted to the construction of a time-optimal method for measuring the maximum permissible (critical) value of the supply voltage (as well as other parameters) of the device on which the cryptographic algorithm is performed. Knowledge of these values is necessary for successful conduct of error injection, as part of a fault attack. The method is based on dynamic programming. Bibliogr. 11.
Keywords: fault-attack, dynamic programming.
@article{DA_2024_31_2_a5,
     author = {Yu. A. Zuev and P. G. Klyucharev},
     title = {A~method for optimal value measurement of~some~parameters of~fault~attacks on~cryptographic algorithms},
     journal = {Diskretnyj analiz i issledovanie operacij},
     pages = {96--107},
     year = {2024},
     volume = {31},
     number = {2},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/DA_2024_31_2_a5/}
}
TY  - JOUR
AU  - Yu. A. Zuev
AU  - P. G. Klyucharev
TI  - A method for optimal value measurement of some parameters of fault attacks on cryptographic algorithms
JO  - Diskretnyj analiz i issledovanie operacij
PY  - 2024
SP  - 96
EP  - 107
VL  - 31
IS  - 2
UR  - http://geodesic.mathdoc.fr/item/DA_2024_31_2_a5/
LA  - ru
ID  - DA_2024_31_2_a5
ER  - 
%0 Journal Article
%A Yu. A. Zuev
%A P. G. Klyucharev
%T A method for optimal value measurement of some parameters of fault attacks on cryptographic algorithms
%J Diskretnyj analiz i issledovanie operacij
%D 2024
%P 96-107
%V 31
%N 2
%U http://geodesic.mathdoc.fr/item/DA_2024_31_2_a5/
%G ru
%F DA_2024_31_2_a5
Yu. A. Zuev; P. G. Klyucharev. A method for optimal value measurement of some parameters of fault attacks on cryptographic algorithms. Diskretnyj analiz i issledovanie operacij, Tome 31 (2024) no. 2, pp. 96-107. http://geodesic.mathdoc.fr/item/DA_2024_31_2_a5/

[1] Baksi A., Bhasin S., Breier J., Jap D., Saha D., “A survey on fault attacks on symmetric key cryptosystems”, ACM Comput. Surveys, 55:4 (2022), 86, 34 pp. | MR

[2] Breier J., Jap D., “A survey of the state-of-the-art fault attacks”, Proc. 14th Int. Symp. Integrated Circuits (Singapore, Dec. 10–12, 2014), IEEE, Piscataway, 2014, 152–155

[3] Giraud C., Thiebeauld H., “A survey on fault attacks”, Smart card research and advanced applications VI, IFIP 18th World Computer Congress. TC8/WG8.8 TC11/WG11.2 6th Int. Conf. (Toulouse, France, Aug. 22–27, 2004), Kluwer Acad. Publ., New York, 2004, 159–176

[4] Kim C. H., Quisquater J.-J., “Faults, injection methods, and fault attacks”, IEEE Des. Test Comput., 24:6 (2007), 544–545 | DOI

[5] Gangolli A., Mahmoud Q. H., Azim A., “A systematic review of fault injection attacks on IoT systems”, Electronics, 11:13 (2022), 2023, 24 pp. | DOI

[6] Piscitelli R., Bhasin S., Regazzoni F., “Fault attacks, injection techniques and tools for simulation”, Hardware security and trust. Design and deployment of integrated circuits in a threatened environment, Springer, Cham, 2017, 27–47

[7] Shepherd C., Markantonakis K., van Heijningen N., Aboulkassimi D., Gaine C., Heckmann T., Naccache D., “Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis”, Comput. Secur., 111 (2021), 102471, 31 pp. | DOI

[8] R. Bellman, Dynamic Programming, Princeton Univ. Press, Princeton, NJ, 1957 | MR | MR | Zbl

[9] Dreyfus S., The art and theory of dynamic programming, Math. Sci. Eng., 130, Acad. Press, New York, 1977, 284 pp. | MR | Zbl

[10] Lew A., Mauch H., Dynamic programming: A computational tool, Springer, Heidelberg, 2010, 379 pp.

[11] Cormen T. H., Leiserson C. E., Rivest R. L., Stein C., Introduction to algorithms, MIT Press, Cambridge, MA, 2022, 1312 pp. | MR | Zbl