Skip to main content

A successful fault attack on an Integrated Circuit Card (ICC) or smartcard requires two steps: fault injection and the fault exploitation. The first step consists in injecting a fault at the appropriate time during the process. Fault injection is very dependent on the hardware and therefore the ICC. The second step consists in exploiting the erroneous result or unexpected behavior. Fault exploitation depends on the software design and implementation. In the case of an algorithm it will also depend on its specification since the fault exploitation will be combined with cryptanalysis most of the time. Depending on the type of analysis performed, the fault injection will have to be done at a precise instant or roughly in a given period of time.

figure 1_0-387-23483-7_157

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Boneh, Dan, Richard A. DeMillo, and Richard J. Lipton (1997). ā€œOn the importance of checking cryptographic protocols for faults.ā€ Advances in Cryptologyā€”EUROCRYPT'97, Lecture Notes in Computer Science, vol. 1233, ed. W. Fumy. Springer-Verlag, Berlin, 37ā€“51.

    Google ScholarĀ 

  2. Joye, Marc, Arjen K. Lenstra, and Jean-Jacques Quisquater (1999). ā€œChinese remaindering cryptosystems in the presence of faults.ā€ Journal of Cryptology, 12 (4), 241ā€“245.

    ArticleĀ  MATHĀ  Google ScholarĀ 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2005 International Federation for Information Processing

About this entry

Cite this entry

BenoƮt, O. (2005). Fault Attack. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_157

Download citation

Publish with us

Policies and ethics