Un ataque de canal lateral explota un observable físico proveniente de un dispositivo criptográfico con el fin de extraer sus secretos [2]. El objetivo de este proyecto es optimizar y automatizar los ataques de canal lateral en el ámbito de la lectura de trazas y la medida de emisión electromagnética de un circuito criptográfico objeto de...
-
April 17, 2023 (v1)PublicationUploaded on: April 19, 2023
-
May 10, 2024 (v1)Publication
The majority of data exchanged between connected devices are confidential and must be protected against unauthorized access. To ensure data protection, so-called cryptographic algorithms are used. These algorithms have proven to be mathematically secure against brute force due to the key length, but their physical implementations are vulnerable...
Uploaded on: April 5, 2025 -
December 1, 2022 (v1)Publication
Side-channel attacks are a real threat, exploiting and revealing the secret data stored in our electronic devices just analyzing the leaked information of the cryptographic modules during their normal encryption/decryption operations. In this sense, electromagnetic attacks have been posed as one of the most powerful attacks, retrieving the...
Uploaded on: December 4, 2022 -
December 12, 2023 (v1)PublicationExperimental cartography generation methodology for Electromagnetic Fault Injection Attacks [póster]
The Electromagnetic Fault Injection (EMFI) is one of the methods to inject faults in the circuits with different purposes, from the security analysis point of view to the study of resilience against environmental conditions of the circuits. Focusing on secure cryptographic applications, in order to study the vulnerability of a circuit and...
Uploaded on: December 14, 2023 -
August 26, 2024 (v1)Publication
In this paper, we present a review of the work [1]. Some of the most powerful hardware attacks are called fault injection attacks. These attacks involve introducing a malfunction into the normal operation of the device and then analyzing the data obtained by comparing them with the expected behavior, to retrieve secret information. To implement...
Uploaded on: August 27, 2024