Cryptography Reference
In-Depth Information
1.6 Conclusion
In this chapter we have given several practical examples of how different types of
side-channels can be used to enable fault attacks. In our examples, side-channel
attacks are used to determine trigger points for inducing faults. This can be done
using simple side-channel attacks, which are typically combined with on-the-fly fault
insertion techniques. As an alternative, one can apply differential side-channel attacks
to determine (the order of) operations and launch fault attacks with this information.
Lastly, we have sketched some advanced scenarios, all of which are related to different
types of countermeasures. We have described how each countermeasure may help
or hinder fault attacks.
Search WWH ::




Custom Search