The Electromagnetic Fault Injection (EMFI) is one of the methods to inject faults in the circuits with different purposes, from the security analysis point of view to the study of resilience against environmental conditions of the circuits. Focusing on secure cryptographic applications, in order to study the vulnerability of a circuit and...
-
December 12, 2023 (v1)PublicationExperimental cartography generation methodology for Electromagnetic Fault Injection Attacks [póster]Uploaded on: December 14, 2023
-
June 8, 2022 (v1)Publication
El desarrollo del Ciclo de Mejora en el Aula (CIMA) se ha llevado a cabo en la asignatura Electrónica Digital de segundo curso del Grado de Ingeniería Electrónica Industrial impartido en la Escuela Politécnica Superior de la Universidad de Sevilla. En este capítulo se detallan el diseño y resultados del CIMA desarrollado durante ocho horas de...
Uploaded on: March 25, 2023 -
July 8, 2024 (v1)Publication
El desarrollo del Ciclo de Mejora en el Aula (CIMA) se ha llevado a cabo en la asignatura Electrónica Digital de segundo curso del Grado de Ingeniería Electrónica Industrial impartido en la Escuela Politécnica Superior de la Universidad de Sevilla. En este capítulo se detallan el diseño y resultados obtenidos de la aplicación de un CIMA de diez...
Uploaded on: July 9, 2024 -
May 25, 2018 (v1)Publication
La información intercambiada diariamente en las redes de comunicación crece de forma exponencial y gran parte de ella está constituida por información sensible, por lo que debe estar protegida para prevenir su uso fraudulento. Una correcta aplicación de la Criptografía evita el acceso no deseado, de forma que esta información pueda ser...
Uploaded on: December 5, 2022 -
March 11, 2019 (v1)Publication
Las comunicaciones entre dispositivos aumenta día a día y un gran ejemplo de ello es el crecimiento del Internet de las cosas, en inglés Internet of things (IoT). De entre todas las comunicaciones que se producen, parte de ella está compuesta por información sensible susceptible de ser interceptada por terceras partes con fines...
Uploaded on: December 4, 2022 -
March 10, 2021 (v1)Publication
Ministerio de Economía y Competitividad TEC2013-45523-R
Uploaded on: December 4, 2022 -
October 3, 2017 (v1)Publication
This article presents the development of an experimental system to introduce faults in Trivium stream ciphers implemented on FPGA. The developed system has made possible to analyze the vulnerability of these implementations against fault attacks. The developed system consists of a mechanism that injects small pulses in the clock signal, and...
Uploaded on: December 4, 2022 -
May 10, 2024 (v1)Publication
The majority of data exchanged between connected devices are confidential and must be protected against unauthorized access. To ensure data protection, so-called cryptographic algorithms are used. These algorithms have proven to be mathematically secure against brute force due to the key length, but their physical implementations are vulnerable...
Uploaded on: April 5, 2025 -
March 10, 2021 (v1)Publication
The security of cryptocircuits is today threatened not only by attacks on algorithms but also, and above all, by attacks on the circuit implementations themselves. These are known as side channel attacks. One variety is the Active Fault Analysis attack, that can make a circuit vulnerable by changing its behavior in a certain way. This article...
Uploaded on: March 25, 2023 -
March 10, 2021 (v1)Publication
Today, the large amount of information exchanged among various devices as well as the growth of the Internet of Things (IoT) demand the development of devices that ensure secure communications, preventing malicious agents from tapping sensitive data. Indeed, information security is one of the key challenges to address within the IoT field....
Uploaded on: February 7, 2024 -
April 3, 2025 (v1)Publication
Considerable attention has been given to addressing side-channel attacks to improve the security of cryptographic hardware implementations. These attacks encourage the exploration of various countermeasures across different levels of abstraction, through masking and hiding techniques, mainly. In this paper, we introduce a novel hiding...
Uploaded on: April 5, 2025 -
March 18, 2022 (v1)Publication
The development of differential fault analysis (DFA) techniques and mechanisms to inject faults into cryptographic circuits brings with it the need to use protection mechanisms that guarantee the expected level of security. The AES cipher, as a standard, has been the target of numerous DFA techniques, where its security has been compromised...
Uploaded on: April 4, 2025 -
January 16, 2023 (v1)Publication
Differential Fault Analysis (DFA) and Power Analysis (PA) attacks, have become the main methods for exploiting the vulnerabilities of physical implementations of block ciphers, currently used in a multitude of applications, such as the Advanced Encryption Standard (AES). In order to minimize these types of vulnerabilities, several mechanisms...
Uploaded on: March 24, 2023 -
March 21, 2022 (v1)Publication
The fast settlement of privacy and secure operations in the Internet of Things (IoT) is appealing in the selection of mechanisms to achieve a higher level of security at minimum cost and with reasonable performances. All these aspects have been widely considered by the scientific community, but more effort is needed to allow the crypto-designer...
Uploaded on: April 4, 2025 -
February 15, 2022 (v1)Publication
Attacks on cryptocircuits are becoming increasingly sophisticated, requiring designers to include more and more countermeasures in the design to protect it against malicious attacks. Fault Injection Attacks and Differential Fault Analysis have proven to be very dangerous as they are able to retrieve the secret information contained in...
Uploaded on: April 4, 2025 -
December 1, 2022 (v1)Publication
Side-channel attacks are a real threat, exploiting and revealing the secret data stored in our electronic devices just analyzing the leaked information of the cryptographic modules during their normal encryption/decryption operations. In this sense, electromagnetic attacks have been posed as one of the most powerful attacks, retrieving the...
Uploaded on: December 4, 2022 -
March 10, 2021 (v1)Publication
The fault injection in ciphers operation is a very successful mechanism to attack them. The inclusion of elements of protection against this kind of attacks is more and more necessary. These mechanisms are usually based on introducing redundancy, which leads to a greater consumption of resources or a longer processing time. This article...
Uploaded on: December 5, 2022 -
December 7, 2021 (v1)Publication
The security of cryptocircuits is determined not only for their mathematical formulation, but for their physical implementation. The so-called fault injection attacks, where an attacker inserts faults during the operation of the cipher to obtain a malfunction to reveal secret information, pose a serious threat for security. These attacks are...
Uploaded on: March 8, 2024 -
March 12, 2021 (v1)Publication
Digital design learning at Register Transfer (RT) level requires practical and complex examples as learning progresses. FPGAs and development boards offer a suitable platform for the implementation of these designs. However, classroom practice sessions usually last two hours, which does not allow the complexity of the designs be high enough....
Uploaded on: April 4, 2025 -
January 26, 2022 (v1)Publication
Digital design learning at the RT level requires practical examples and as learning progresses, the examples need to become more complex. FPGAs and development boards offer a very suitable platform for the implementation of these designs. However, classroom practice sessions usually last two hours, which does not allow the complexity of the...
Uploaded on: March 25, 2023 -
January 28, 2021 (v1)Publication
One of the best methods to improve the security of cryptographic systems used to exchange sensitive information is to attack them to find their vulnerabilities and to strengthen them in subsequent designs. Trivium stream cipher is one of the lightweight ciphers designed for security applications in the Internet of things (IoT). In this paper,...
Uploaded on: March 8, 2024