Skip navigation
  • Home
  • Browse
    • Communities
      & Collections
    • Browse Items by:
    • Publication Date
    • Author
    • Title
    • Subject
    • Department
  • Sign on to:
    • My MacSphere
    • Receive email
      updates
    • Edit Profile


McMaster University Home Page
  1. MacSphere
  2. Open Access Dissertations and Theses Community
  3. Open Access Dissertations and Theses
Please use this identifier to cite or link to this item: http://hdl.handle.net/11375/23808
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorNicolici, Nicola-
dc.contributor.authorPogue, Trevor-
dc.date.accessioned2019-01-23T16:20:52Z-
dc.date.available2019-01-23T16:20:52Z-
dc.date.issued2019-
dc.identifier.urihttp://hdl.handle.net/11375/23808-
dc.description.abstractElectronic devices such as phones and computers use cryptography to achieve information security. However, while cryptographic algorithms may be strong theoretically, their physical implementations in hardware can leak unintentional side information as a byproduct of performing their computations. A device's security can be compromised from this leakage through side-channel attacks. Research in hardware security reveals how dangerous these attacks can be and provides security countermeasures. This thesis focuses on a category of side-channel attacks called fault attacks, and contributes a new fault attack method that can compromise a cryptographic device more rapidly than the previous methods when using practical fault injection techniques. We observe that as a circuit is further overclocked, new faults are often superimposed upon previous ones. We analyze the incremental changes rather than the total sum in order to extract more secret information. Unlike many previous methods, ours does not require precise fault injection techniques and requires no knowledge of when the internal state is in a specific algorithmic stage. Results are confirmed experimentally on hardware implementations of AES-128, 192, and 256.en_US
dc.language.isoenen_US
dc.subjectside-channelen_US
dc.subjectattacken_US
dc.subjectfaulten_US
dc.subjectcryptographyen_US
dc.subjecthardwareen_US
dc.subjectsecurityen_US
dc.subjectAESen_US
dc.subjectdifferential fault analysisen_US
dc.subjectincremental fault analysisen_US
dc.subjectDFAen_US
dc.subjectIFAen_US
dc.titleIncremental Fault Analysis: A New Differential Fault Attack on Block Ciphersen_US
dc.typeThesisen_US
dc.contributor.departmentElectrical and Computer Engineeringen_US
dc.description.degreetypeThesisen_US
dc.description.degreeMaster of Applied Science (MASc)en_US
Appears in Collections:Open Access Dissertations and Theses

Files in This Item:
File Description SizeFormat 
pogue_trevor_e_2018december_masc.pdf
Open Access
2.96 MBAdobe PDFView/Open
Show simple item record Statistics


Items in MacSphere are protected by copyright, with all rights reserved, unless otherwise indicated.

Sherman Centre for Digital Scholarship     McMaster University Libraries
©2022 McMaster University, 1280 Main Street West, Hamilton, Ontario L8S 4L8 | 905-525-9140 | Contact Us | Terms of Use & Privacy Policy | Feedback

Report Accessibility Issue