Investigation in burst pulse injection method for fault based cryptanalysis

Kengo Iokibe, Kazuhiro Maeshima, Hiroto Kagotani, Yasuyuki Nogami, Yoshitaka Toyota, Tetsushi Watanabe

Research output: Contribution to journalConference articlepeer-review

4 Citations (Scopus)

Abstract

This paper investigated about introduction of the burst pulse injection method standardized for immunity tests to a cryptanalysis using faulty ciphertexts. We investigated the potential of the burst injection method to induce faulty ciphertexts experimentally. Firstly, the standard burst pulse was injected through the power cable to a cryptographic module implementing the Advanced Encryption Standard (AES) on a field programmable gate array (FPGA). As a result, it was confirmed that the burst pulse injection might cause clock glitches on the module. Secondly, the clock glitch was varied in magnitude and timing by use of two pulse generators and transmitted to the AES circuit to clarify what types of clock glitch induce critical faulty ciphertexts suited for recovering the crypto-key successfully. Results confirmed that the clock glitch had potential to induce faulty ciphertexts when it exceeded the threshold and produced a clock interval shorter than the critical path delay in the target round. The two experimental results suggested that burst pulse injection to cryptographic modules through their power cables is a possible scenario of fault analysis attacks.

Original languageEnglish
Article number6899067
Pages (from-to)743-747
Number of pages5
JournalIEEE International Symposium on Electromagnetic Compatibility
Volume2014-September
Issue numberSeptember
DOIs
Publication statusPublished - Sept 15 2014
Event2014 IEEE International Symposium on Electromagnetic Compatibility, EMC 2014 - Raleigh, United States
Duration: Aug 3 2014Aug 8 2014

ASJC Scopus subject areas

  • Condensed Matter Physics
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Investigation in burst pulse injection method for fault based cryptanalysis'. Together they form a unique fingerprint.

Cite this