Skip to main content

Differential Fault Analysis

  • Living reference work entry
  • First Online:
Encyclopedia of Cryptography, Security and Privacy
  • 50 Accesses

Synonyms

Collision fault analysis; Fault analysis, Fault attacks, Fault injection

Definitions

Differential fault analysis is an active attack against cryptographic implementations. The goal is to induce faults during a cryptographic operation to infer private information (e.g., a decryption key).

Background

Cryptographic systems should not only be resistant to cryptanalysis, but they should also be resistant to implementation attacks, including side-channel and fault attacks. Differential fault analysis was developed by Boneh et al. (2001) and extended to the symmetric-key setting by Biham and Shamir (1997). The principle idea behind fault attacks consists in modifying the normal behavior of a cryptographic implementation in order to get a faulty output. Then from one or more faulty outputs, the attacker tries to infer some information about the secret key. Examples of practical fault injection are described in Skorobogatov and Anderson (2002) and Bar-El et al. (2006). When...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Bar-El H, Choukri H, Naccache D, Tunstall M, Whelan C (2006) The sorcerer’s apprentice guide to fault attacks. Proc IEEE 94(2):370–382. https://doi.org/10.1109/JPROC.2005.862424

    Article  Google Scholar 

  • Biham E, Shamir A (1997) Differential fault analysis of secret key cryptosystems. In: Kaliski Jr BS (ed) Advances in Cryptology – CRYPTO ’97. Lecture Notes in Computer Science, vol 1294. Springer, pp 513–525. https://doi.org/10.1007/BFb0052259

  • Blömer J, Seifert J (2003) Fault based cryptanalysis of the advanced encryption standard (AES). In: Wright RN (ed) Financial Cryptography (FC 2003). Lecture Notes in Computer Science, vol 2742. Springer, pp 162–181. https://doi.org/10.1007/978-3-540-45126-6_12

  • Boneh D, DeMillo RA, Lipton RJ (2001) On the importance of eliminating errors in cryptographic computations. J Cryptol 14(2):101–119. https://doi.org/10.1007/s001450010016. Earlier version appeared in Proceedings of EUROCRYPT ’97

  • Hemme L (2004) A differential fault attack against early rounds of (triple-)DES. In: Joye M, Quisquater JJ (eds) Cryptographic Hardware and Embedded Systems – CHES 2004. Lecture Notes in Computer Science, vol 3156. Springer, pp 254–267. https://doi.org/10.1007/978-3-540-28632-5_19

  • Joye M, Tunstall M (eds) (2012) Fault Analysis in Cryptography. Information Security and Cryptography, Springer. https://doi.org/10.1007/978-3-642-29656-7

    MATH  Google Scholar 

  • Kim CH, Quisquater JJ (2007) Fault attacks for CRT based RSA: new attacks, new results, and new countermeasures. In: Sauveron D et al (eds) Information Security Theory and Practices (WISTP 2007). Lecture Notes in Computer Science, vol 4462. Springer, pp 215–228. https://doi.org/10.1007/978-3-540-72354-7_18

  • Nyberg K (1993) Differentially uniform mappings for cryptography. In: Helleseth T (ed) Advances in Cryptology – EUROCRYPT ’93. Lecture Notes in Computer Science, vol 765. Springer, pp 55–64. https://doi.org/10.1007/3-540-48285-7_6

  • Skorobogatov SP, Anderson RJ (2002) Optical fault induction attacks. In: Kaliski BS Jr et al (eds) Cryptographic Hardware and Embedded Systems – CHES 2002. Lecture Notes in Computer Science, vol 2523. Springer, pp 2–12. https://doi.org/10.1007/3-540-36400-5_2

  • Tunstall M, Mukhopadhyay D, Ali S (2011) Differential fault analysis of the advanced encryption standard using a single fault. In: Ardagna CA, Zhou J (eds) Information Security Theory and Practice (WISTP 2011). Lecture Notes in Computer Science, vol 6633. Springer, pp 224–233. https://doi.org/10.1007/978-3-642-21040-2_15

  • Yen SM, Kim S, Lim S, Moon SJ (2003) RSA speedup with Chinese remainder theorem immune against hardware fault cryptanalysis. IEEE Trans Comput 52(4):461–472. https://doi.org/10.1109/TC.2003.1190587

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marc Joye .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2023 Springer Science+Business Media LLC

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Joye, M., Tunstall, M. (2023). Differential Fault Analysis. In: Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27739-9_1707-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27739-9_1707-1

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27739-9

  • Online ISBN: 978-3-642-27739-9

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics