TY - GEN
T1 - Method for estimating fault injection time on cryptographic devices from em leakage
AU - Nakamura, Ko
AU - Hayashi, Yu Ichi
AU - Homma, Naofumi
AU - Mizuki, Takaaki
AU - Aoki, Takafumi
AU - Sone, Hideaki
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/9/10
Y1 - 2015/9/10
N2 - The existing intentional electromagnetic interference (IEMI) fault injection method based on continuous sinusoidal wave has a difficulty in injecting faults at a specific operation or time. This means that the obtained faulty outputs do not always satisfy a specific condition (e.g., time or number of error bytes) for performing fault analysis such as differential fault analysis (DFA). This paper presents a method for estimating the timing of fault occurrences caused by the above IEMI-based method, which make it possible to examine if an obtained faulty output is available for fault analysis. The idea of this method is to observe side-channel information such as EM leakage and estimate fault injection time from the detection of a characteristic change in the obtained waveform. To validate this method, we performed an IEMI fault injection experiment on actual cryptographic hardware (a side-channel attack standard evaluation board). From the obtained faulty encryption outputs and waveforms, we confirm that the fault injection time estimated by back-calculation of faulty outputs corresponded to that obtained by waveform analysis. We also demonstrate the validity of several non-invasive observation techniques for obtaining waveforms.
AB - The existing intentional electromagnetic interference (IEMI) fault injection method based on continuous sinusoidal wave has a difficulty in injecting faults at a specific operation or time. This means that the obtained faulty outputs do not always satisfy a specific condition (e.g., time or number of error bytes) for performing fault analysis such as differential fault analysis (DFA). This paper presents a method for estimating the timing of fault occurrences caused by the above IEMI-based method, which make it possible to examine if an obtained faulty output is available for fault analysis. The idea of this method is to observe side-channel information such as EM leakage and estimate fault injection time from the detection of a characteristic change in the obtained waveform. To validate this method, we performed an IEMI fault injection experiment on actual cryptographic hardware (a side-channel attack standard evaluation board). From the obtained faulty encryption outputs and waveforms, we confirm that the fault injection time estimated by back-calculation of faulty outputs corresponded to that obtained by waveform analysis. We also demonstrate the validity of several non-invasive observation techniques for obtaining waveforms.
KW - fault analysis
KW - intentional electromagnetic interference
KW - side-channel information
UR - http://www.scopus.com/inward/record.url?scp=84953886279&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84953886279&partnerID=8YFLogxK
U2 - 10.1109/ISEMC.2015.7256165
DO - 10.1109/ISEMC.2015.7256165
M3 - Conference contribution
AN - SCOPUS:84953886279
T3 - IEEE International Symposium on Electromagnetic Compatibility
SP - 235
EP - 240
BT - 2015 IEEE International Symposium on Electromagnetic Compatibility, EMC 2015
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - IEEE International Symposium on Electromagnetic Compatibility, EMC 2015
Y2 - 16 August 2015 through 22 August 2015
ER -