In this talk, we survey several fault attacks against commonly used cryptosystems, in both the symmetric and the asymmetric settings. More specifically, we explain how deliberate fault injections may allow an attacker to retrieve secret keys in AES, RSA and ECC cryptosystems. Countermeasures will also be discussed. |