• Skip to content (access key 1)
  • Skip to search (access key 7)
FWF — Austrian Science Fund
  • Go to overview page Discover

    • Research Radar
      • Research Radar Archives 1974–1994
    • Discoveries
      • Emmanuelle Charpentier
      • Adrian Constantin
      • Monika Henzinger
      • Ferenc Krausz
      • Wolfgang Lutz
      • Walter Pohl
      • Christa Schleper
      • Elly Tanaka
      • Anton Zeilinger
    • Impact Stories
      • Verena Gassner
      • Wolfgang Lechner
      • Georg Winter
    • scilog Magazine
    • Austrian Science Awards
      • FWF Wittgenstein Awards
      • FWF ASTRA Awards
      • FWF START Awards
      • Award Ceremony
    • excellent=austria
      • Clusters of Excellence
      • Emerging Fields
    • In the Spotlight
      • 40 Years of Erwin Schrödinger Fellowships
      • Quantum Austria
    • Dialogs and Talks
      • think.beyond Summit
    • Knowledge Transfer Events
    • E-Book Library
  • Go to overview page Funding

    • Portfolio
      • excellent=austria
        • Clusters of Excellence
        • Emerging Fields
      • Projects
        • Principal Investigator Projects
        • Principal Investigator Projects International
        • Clinical Research
        • 1000 Ideas
        • Arts-Based Research
        • FWF Wittgenstein Award
      • Careers
        • ESPRIT
        • FWF ASTRA Awards
        • Erwin Schrödinger
        • doc.funds
        • doc.funds.connect
      • Collaborations
        • Specialized Research Groups
        • Special Research Areas
        • Research Groups
        • International – Multilateral Initiatives
        • #ConnectingMinds
      • Communication
        • Top Citizen Science
        • Science Communication
        • Book Publications
        • Digital Publications
        • Open-Access Block Grant
      • Subject-Specific Funding
        • AI Mission Austria
        • Belmont Forum
        • ERA-NET HERA
        • ERA-NET NORFACE
        • ERA-NET QuantERA
        • ERA-NET TRANSCAN
        • Alternative Methods to Animal Testing
        • European Partnership Biodiversa+
        • European Partnership BrainHealth
        • European Partnership ERA4Health
        • European Partnership ERDERA
        • European Partnership EUPAHW
        • European Partnership FutureFoodS
        • European Partnership OHAMR
        • European Partnership PerMed
        • European Partnership Water4All
        • Gottfried and Vera Weiss Award
        • netidee SCIENCE
        • Herzfelder Foundation Projects
        • Quantum Austria
        • Rückenwind Funding Bonus
        • WE&ME Award
        • Zero Emissions Award
      • International Collaborations
        • Belgium/Flanders
        • Germany
        • France
        • Italy/South Tyrol
        • Japan
        • Luxembourg
        • Poland
        • Switzerland
        • Slovenia
        • Taiwan
        • Tyrol–South Tyrol–Trentino
        • Czech Republic
        • Hungary
    • Step by Step
      • Find Funding
      • Submitting Your Application
      • International Peer Review
      • Funding Decisions
      • Carrying out Your Project
      • Closing Your Project
      • Further Information
        • Integrity and Ethics
        • Inclusion
        • Applying from Abroad
        • Personnel Costs
        • PROFI
        • Final Project Reports
        • Final Project Report Survey
    • FAQ
      • Project Phase PROFI
      • Project Phase Ad Personam
      • Expiring Programs
        • Elise Richter and Elise Richter PEEK
        • FWF START Awards
  • Go to overview page About Us

    • Mission Statement
    • FWF Video
    • Values
    • Facts and Figures
    • Annual Report
    • What We Do
      • Research Funding
        • Matching Funds Initiative
      • International Collaborations
      • Studies and Publications
      • Equal Opportunities and Diversity
        • Objectives and Principles
        • Measures
        • Creating Awareness of Bias in the Review Process
        • Terms and Definitions
        • Your Career in Cutting-Edge Research
      • Open Science
        • Open-Access Policy
          • Open-Access Policy for Peer-Reviewed Publications
          • Open-Access Policy for Peer-Reviewed Book Publications
          • Open-Access Policy for Research Data
        • Research Data Management
        • Citizen Science
        • Open Science Infrastructures
        • Open Science Funding
      • Evaluations and Quality Assurance
      • Academic Integrity
      • Science Communication
      • Philanthropy
      • Sustainability
    • History
    • Legal Basis
    • Organization
      • Executive Bodies
        • Executive Board
        • Supervisory Board
        • Assembly of Delegates
        • Scientific Board
        • Juries
      • FWF Office
    • Jobs at FWF
  • Go to overview page News

    • News
    • Press
      • Logos
    • Calendar
      • Post an Event
      • FWF Informational Events
    • Job Openings
      • Enter Job Opening
    • Newsletter
  • Discovering
    what
    matters.

    FWF-Newsletter Press-Newsletter Calendar-Newsletter Job-Newsletter scilog-Newsletter

    SOCIAL MEDIA

    • LinkedIn, external URL, opens in a new window
    • , external URL, opens in a new window
    • Facebook, external URL, opens in a new window
    • Instagram, external URL, opens in a new window
    • YouTube, external URL, opens in a new window

    SCILOG

    • Scilog — The science magazine of the Austrian Science Fund (FWF)
  • elane login, external URL, opens in a new window
  • Scilog external URL, opens in a new window
  • de Wechsle zu Deutsch

  

Investigation of Implementation Attacks

Investigation of Implementation Attacks

Reinhard Posch (ORCID: )
  • Grant DOI 10.55776/P22241
  • Funding program Principal Investigator Projects
  • Status ended
  • Start March 1, 2010
  • End November 30, 2012
  • Funding amount € 259,791
  • Project website

Disciplines

Electrical Engineering, Electronics, Information Engineering (15%); Computer Sciences (60%); Mathematics (25%)

Keywords

    Embedded Systems, Cryptography, Side Channel Analysis (SCA), Fault Attacks (FA), SCA & FA Countermearsures, VLSI Design

Abstract Final report

In order to provide security for sensitive data on smart cards and embedded systems cryptographic algorithms are used. Unfortunately, even if such an algorithm has been evaluated in a mathematical model, the realization might leak information due to physical aspects of its implementation. Methods that use these aspects are called implementation attacks. They range from side-channel analysis, which exploit unintentionally leaking information during a critical operation, to fault attacks, which try to manipulate the behavior of a device. Side channel analysis as well as fault attacks have been widely researched in the cryptographic community. While side-channel analysis has been considered in theory and practice, most publications on fault attacks are theoretical. Thus, there are still many open questions in the field of practical fault injection. Furthermore, side-channel analysis and fault attacks are mostly considered separated. Recent research in combined attacks indicates that there are various possibilities to develop new attacks and appropriate countermeasures. The first goal of this project is to investigate different methods to influence the behavior of a device. Based on the possibilities of such a manipulation, fault attacks as well as countermeasures against them are developed. Our second goal is to expand the research on fault attacks by combining them with side-channel analysis. Our third goal is to continue our study on side-channels, which has been conducted within the FWF-funded project P18321-N15.

Every day, millions of small electronic devices face their task of processing and transmitting sensitive information in a vast number of various scenarios: e.g., conditional access modules like smart cards, secure data transmission between dedicated cryptographic coprocessors, secure storage of sensitive information in an embedded system. The so-called security devices usually execute some kind of mathematically secure cryptographic algorithm using a secret, usually denoted as secret key. The simplest attack on such devices would be a brute-force attack. Due to the high complexity of modern cryptographic algorithms, breaking (i.e. revealing the secret key) such devices by means of brute-force attacks would require thousands of billions of years using todays most powerful supercomputers. However, except for mathematical cryptanalysis there are several attack scenarios targeting the implementation of the cryptographic algorithm within a hardware device. The investigation of various types of so-called implementation attacks was the main goal of this project.During the project we intensively worked on practical methods to inject faults into various microcontrollers, i.e. to intentionally cause a malfunction of the devices to either reveal secret information stored on the device or to bypass / deactivate countermeasures against implementation attacks on the device. We successfully injected faults into various common microcontrollers by manipulating the clock signal, the power supply, the ambient temperature, as well as by laser shots in the devices using different types of laser diodes (different wavelengths). It turned out that modern asymmetric encryption schemes like RSA can be broken within minutes, even if they are protected against basic implementation attacks.Another very important part of the project was the investigation of electromagnetic emanations in the far field (approximately 30cm) of passive UHF RFID tags. It turned out that commercial low-cost RFID tags can be attacked from a certain distance by performing measurements in the EM far field. Contrary, modern WISP tags seemed to be more resistant to attacks based on measurements in the far field. In case of these devices, a different measurement procedure close to the tags was necessary to perform successful attacks.Further important results of the project in the field of side-channel attacks were: a combination of HW and SW countermeasures on a 32-bit processor platform resulting in very high security; the demonstration that stepped EM measurements on a microcontroller can be used to track the data flow within the device to a certain degree; and a completely new approach for hardware designers to verify the resistance against side-channel attacks based on exploiting the side-channel leakages of two devices at once.The results of the achieved project goals have been disseminated in more than 10 publications in international conference proceedings and journals.

Research institution(s)
  • Technische Universität Graz - 100%
International project participants
  • Bart Preneel, Katholieke Universiteit Leuven - Belgium
  • Maria Elisabeth Oswald, Bristol University

Research Output

  • 165 Citations
  • 15 Publications
Publications
  • 2012
    Title Exploiting the Difference of Side-Channel Leakages
    DOI 10.1007/978-3-642-29912-4_1
    Type Book Chapter
    Author Hutter M
    Publisher Springer Nature
    Pages 1-16
  • 2012
    Title Countermeasures for Symmetric Key Ciphers
    DOI 10.1007/978-3-642-29656-7_5
    Type Book Chapter
    Author Schmidt J
    Publisher Springer Nature
    Pages 73-87
  • 2012
    Title On Measuring the Parasitic Backscatter of Sensor-enabled UHF RFID Tags
    DOI 10.1109/ares.2012.21
    Type Conference Proceeding Abstract
    Author Plos T
    Pages 38-46
  • 2012
    Title On Measuring the Parasitic Backscatter of Sensor-enabled UHF RFID Tags.
    Type Conference Proceeding Abstract
    Author Maierhofer C
    Conference Gerald Quirchmayr, Josef Basl, Ilsun You, Lida Xu, Edgar Weippl, editors, 7th Conference on Availability, Reliability and Security (ARES 2012), Prague, Czech Republic, August 20-24
  • 2011
    Title Implementation and Evaluation of an SCA-Resistant Embedded Processor
    DOI 10.1007/978-3-642-27257-8_10
    Type Book Chapter
    Author Tillich S
    Publisher Springer Nature
    Pages 151-165
    Link Publication
  • 2011
    Title Learning from Electromagnetic Emanations - A Case Study for iMDPL.
    Type Conference Proceeding Abstract
    Author Kirschbaum M
    Conference Second International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2011, 24-25 February 2011, Darmstadt, Germany, Workshop Proceedings COSADE 2011
  • 2011
    Title Test Apparatus for Side-Channel Resistance Compliance Testing.
    Type Conference Proceeding Abstract
    Author Hutter M
    Conference Non-Invasive Attack Testing Workshop - NIAT, Nara, Japan, September 26-27
  • 2011
    Title Low-cost fault detection method for ECC using Montgomery powering ladder.
    Type Conference Proceeding Abstract
    Author Karaklajic D
    Conference Design, Automation and Test in Europe, DATE 2011, Grenoble, France, March 14-18
  • 2011
    Title Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power Analysis Methods
    DOI 10.1109/tvlsi.2011.2160375
    Type Journal Article
    Author Moradi A
    Journal IEEE Transactions on Very Large Scale Integration (VLSI) Systems
    Pages 1578-1589
  • 2010
    Title Algebraic Side-Channel Analysis in the Presence of Errors
    DOI 10.1007/978-3-642-15031-9_29
    Type Book Chapter
    Author Oren Y
    Publisher Springer Nature
    Pages 428-442
  • 2010
    Title A Continuous Fault Countermeasure for AES Providing a Constant Error Detection Rate
    DOI 10.1109/fdtc.2010.16
    Type Conference Proceeding Abstract
    Author Medwed M
    Pages 66-71
  • 2011
    Title The Fault Attack Jungle - A Classification Model to Guide You
    DOI 10.1109/fdtc.2011.13
    Type Conference Proceeding Abstract
    Author Verbauwhede I
    Pages 3-8
  • 2011
    Title Fault Attacks on the Montgomery Powering Ladder
    DOI 10.1007/978-3-642-24209-0_26
    Type Book Chapter
    Author Schmidt J
    Publisher Springer Nature
    Pages 396-406
  • 2011
    Title Low-Cost Fault Detection Method for ECC Using Montgomery Powering Ladder
    DOI 10.1109/date.2011.5763165
    Type Conference Proceeding Abstract
    Author Karaklajic D
    Pages 1-6
  • 2013
    Title On measuring the parasitic backscatter of sensor-enabled UHF RFID tags
    DOI 10.1016/j.istr.2013.02.004
    Type Journal Article
    Author Plos T
    Journal Information Security Technical Report
    Pages 239-252

Discovering
what
matters.

Newsletter

FWF-Newsletter Press-Newsletter Calendar-Newsletter Job-Newsletter scilog-Newsletter

Contact

Austrian Science Fund (FWF)
Georg-Coch-Platz 2
(Entrance Wiesingerstraße 4)
1010 Vienna

office(at)fwf.ac.at
+43 1 505 67 40

General information

  • Job Openings
  • Jobs at FWF
  • Press
  • Philanthropy
  • scilog
  • FWF Office
  • Social Media Directory
  • LinkedIn, external URL, opens in a new window
  • , external URL, opens in a new window
  • Facebook, external URL, opens in a new window
  • Instagram, external URL, opens in a new window
  • YouTube, external URL, opens in a new window
  • Cookies
  • Whistleblowing/Complaints Management
  • Accessibility Statement
  • Data Protection
  • Acknowledgements
  • IFG-Form
  • Social Media Directory
  • © Österreichischer Wissenschaftsfonds FWF
© Österreichischer Wissenschaftsfonds FWF