Jrn-Marc Schmidt joern-marc.schmidt@iaik.tugraz.at Introduction and - - PowerPoint PPT Presentation

j rn marc schmidt
SMART_READER_LITE
LIVE PREVIEW

Jrn-Marc Schmidt joern-marc.schmidt@iaik.tugraz.at Introduction and - - PowerPoint PPT Presentation

Jrn-Marc Schmidt joern-marc.schmidt@iaik.tugraz.at Introduction and Adversaries Attack Setups Attacks in Theory Example: Square and Multiply Combined Attacks Conclusion, Outlook Fault Type Transient Permanent


slide-1
SLIDE 1

Jörn-Marc Schmidt

joern-marc.schmidt@iaik.tugraz.at

slide-2
SLIDE 2
  • Introduction and Adversaries
  • Attack Setups
  • Attacks in Theory
  • Example: Square and Multiply
  • Combined Attacks
  • Conclusion, Outlook
slide-3
SLIDE 3
slide-4
SLIDE 4
  • Fault Type

–Transient –Permanent –Destructive

  • Timing
  • Precision

(Bit, Byte, Word)

  • Set, Flip, Program Flow..
slide-5
SLIDE 5
  • Class I

Clever Outsider

  • Class II

Knowledgeable Insider

  • Class III

Funded Company

slide-6
SLIDE 6
slide-7
SLIDE 7
slide-8
SLIDE 8
slide-9
SLIDE 9
slide-10
SLIDE 10
slide-11
SLIDE 11
slide-12
SLIDE 12

Manipulation of:

– Loops – Checks

slide-13
SLIDE 13
slide-14
SLIDE 14
slide-15
SLIDE 15
slide-16
SLIDE 16
slide-17
SLIDE 17
slide-18
SLIDE 18
slide-19
SLIDE 19
slide-20
SLIDE 20

0 

R

slide-21
SLIDE 21
slide-22
SLIDE 22
  • Fault attacks are powerful
  • Possible attacks depend on adversary
  • Not only on cryptographic blocks
  • Combined attacks