<?xml version="1.0" encoding="utf-8"?>
<journal>
<title>Biannual Journal Monadi for Cyberspace Security (AFTA)</title>
<title_fa>امنیت فضای تولید و تبادل اطلاعات (منادی)</title_fa>
<short_title>منادی</short_title>
<subject>Engineering &amp; Technology</subject>
<web_url>http://monadi.isc.org.ir</web_url>
<journal_hbi_system_id>1</journal_hbi_system_id>
<journal_hbi_system_user>admin</journal_hbi_system_user>
<journal_id_issn>2476-3047</journal_id_issn>
<journal_id_issn_online>2476-3047</journal_id_issn_online>
<journal_id_pii>8</journal_id_pii>
<journal_id_doi>7</journal_id_doi>
<journal_id_iranmedex></journal_id_iranmedex>
<journal_id_magiran></journal_id_magiran>
<journal_id_sid>14</journal_id_sid>
<journal_id_nlai>8888</journal_id_nlai>
<journal_id_science>13</journal_id_science>
<language>fa</language>
<pubdate>
	<type>jalali</type>
	<year>1404</year>
	<month>6</month>
	<day>1</day>
</pubdate>
<pubdate>
	<type>gregorian</type>
	<year>2025</year>
	<month>9</month>
	<day>1</day>
</pubdate>
<volume>14</volume>
<number>1</number>
<publish_type>online</publish_type>
<publish_edition>1</publish_edition>
<article_type>fulltext</article_type>
<articleset>
	<article>


	<language>fa</language>
	<article_id_doi></article_id_doi>
	<title_fa>مروری بر حملات القاء خطای گذرا به رمزهای قالبی</title_fa>
	<title>An Overview of Transient Fault Attacks on Block Ciphers</title>
	<subject_fa>رمز و امنیت اطلاعات</subject_fa>
	<subject>Cryptology and Information Security</subject>
	<content_type_fa>مروری</content_type_fa>
	<content_type>Review Article</content_type>
	<abstract_fa>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span dir=&quot;RTL&quot; lang=&quot;AR-SA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span arial=&quot;&quot; style=&quot;font-family:&quot;&gt;ﺣﻤﻼﺕ ﺍﻟﻘﺎﺀ ﺧﻄﺎ ﺩﺳﺘﻪ&#8204;ﺍیﯽ ﺍﺯ ﺣﻤﻼﺕ ﻓﻌﺎﻝ ﺩﺭ ﻣﺪﻝ ﺟﻌﺒﻪ ﺧﺎﮐﺴﺘﺮﯼ ﻫﺴﺘﻨﺪ ﮐﻪ ﺩﺭ ﺁﻥ ﻣﻬﺎﺟﻢ ﺑﺎ ﺩﺳﺘﺮﺳﯽ ﻓﯿﺰیﮑﯽ ﺑﻪ ﺩﺳﺘﮕﺎﻩ ﺭﻣﺰﻧﮕﺎﺭﯼ، ﺑﻪ ﺻﻮﺭﺕ ﻋﻤﺪﯼ ﺧﻄﺎیﯽ ﺑﻪ ﺩﺳﺘﮕﺎﻩ ﺍﻋﻤﺎﻝ ﻣﯽﮐﻨﺪ. ﺍیﻦ ﺧﻄﺎ ﻣﻨﺠﺮ ﺑﻪ ﺗﻐﯿﯿﺮ ﺩﺭ ﻣﻘﺎﺩیﺮ ﻣﯿﺎﻧﯽ ﻭ ﺧﺮﻭﺟﯽ ﺩﺳﺘﮕﺎﻩ ﺷﺪﻩ ﻭﻣﻬﺎﺟﻢ ﺑﺎ ﺗﺤﻠﯿﻞ ﺗﻔﺎﻭﺕﻫﺎﯼ ﺍیﺠﺎﺩﺷﺪﻩ، ﺍﻃﻼﻋﺎﺕ ﺣﺴﺎﺱ ﻣﺎﻧﻨﺪ ﮐﻠﯿﺪ ﺭﻣﺰﻧﮕﺎﺭﯼ ﺭﺍ ﺍﺳﺘﺨﺮﺍﺝ ﻣﯽﮐﻨﺪ. ﺑﻪ ﺩﻟﯿﻞ ﺳﻬﻮﻟﺖ ﺍﺟﺮﺍ ﻭ ﮐﺎﺭﺍیﯽ ﺑﺎﻻ، ﺍیﻦ ﺣﻤﻼﺕ ﺗﻬﺪیﺪﯼ ﺟﺪﯼ ﺑﺮﺍﯼ ﺍﻣﻨﯿﺖ ﭘﯿﺎﺩﻩﺳﺎﺯﯼﻫﺎﯼ ﺭﻣﺰﻧﮕﺎﺭﯼ ﻣﺤﺴﻮﺏ ﻣﯽﺷﻮﻧﺪ ﻭ ﻣﯽﺗﻮﺍﻧﻨﺪ ﺣﺘﯽ ﺳﯿﺴﺘﻢﻫﺎﯼ ﺩﺍﺭﺍﯼ ﻣﮑﺎﻧﯿﺴﻢﻫﺎﯼ ﻣﺤﺎﻓﻈﺘﯽ ﺭﺍ ﻧﯿﺰ ﺗﺤﺖ ﺗﺄﺛﯿﺮ ﻗﺮﺍﺭ ﺩﻫﻨﺪ. ﺭﻭﻧﺪ ﺍﺧﯿﺮ ﻧﺸﺎﻥ ﻣﯽﺩﻫﺪ ﮐﻪ ﻣﯿﺰﺍﻥ ﺗﺤﻘﯿﻘﺎﺕ ﺩﺭ ﺍیﻦ ﺣﻮﺯﻩ ﺑﻪ ﻃﻮﺭ ﻗﺎﺑﻞ ﺗﻮﺟﻬﯽ ﺭﺷﺪ ﮐﺮﺩﻩ ﻭ ﺑﻪ ﻋﻨﻮﺍﻥ یﮏ ﺯﻣﯿﻨﻪ ﺗﺤﻘﯿﻘﺎﺗﯽ ﻓﻌﺎﻝ ﺩﺭ ﻣﺒﺤﺚ ﭘﯿﺎﺩﻩﺳﺎﺯﯼ ﺍﻟﮕﻮﺭیﺘﻢﻫﺎﯼ ﺭﻣﺰﻧﮕﺎﺭﯼ ﺑﻪ ﺣﺴﺎﺏ ﻣﯽﺁیﺪ. ﺍﺯ ﺍیﻦ ﺭﻭ ﻧﯿﺎﺯ ﺑﻪ یﮏ ﻣﻄﺎﻟﻌﻪ ﺟﺎﻣﻊ ﮐﻪ ﺩﺭﺑﺮﮔﯿﺮﻧﺪﻩ ﺣﻤﻼﺕ ﺍﻟﻘﺎﺀ ﺧﻄﺎ ﻭ ﺭﺍﻩﻫﺎﯼ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺁﻥ ﺑﺎﺷﺪ، ﺍﺣﺴﺎﺱ ﻣﯽﺷﻮﺩ. ﺩﺭ ﺍیﻦ ﻣﻘﺎﻟﻪ، ﺿﻤﻦ ﻣﻌﺮﻓﯽ ﺣﻤﻠﻪ ﺍﻟﻘﺎﺀ ﺧﻄﺎ، ﺑﻪ ﻭیﮋﮔﯽﻫﺎ، ﻧﻘﺎﻁ ﻗﻮﺕ ﻭ ﺿﻌﻒ ﺍیﻦ ﺣﻤﻠﻪ ﻣﯽﭘﺮﺩﺍﺯیﻢ. ﺳﭙﺲ، ﺩﺭﺍﺩﺍﻣﻪ، ﺭﻭﺵﻫﺎﯼ ﺗﺤﻠﯿﻞ ﺣﻤﻼﺕ ﺭﺍ ﺑﺮﺭﺳﯽ ﻭ ﻣﻘﺎیﺴﻪ ﻣﯽﮐﻨﯿﻢ ﻭ ﺩﺭ ﺍﻧﺘﻬﺎ ﺑﻪ ﺭﻭﺵﻫﺎﯼ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺍیﻦ ﺣﻤﻼﺕ ﻣﯽﭘﺮﺩﺍﺯیﻢ.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</abstract_fa>
	<abstract>&lt;div style=&quot;text-align: justify;&quot;&gt;Fault injection attacks are a category of active attacks within the gray-box model, where the attacker, having physical access to the cryptographic device, deliberately introduces an error into the system. This error leads to alterations in the intermediate and output values of the device, allowing the attacker to extract sensitive information, such as cryptographic keys, by analyzing the resulting discrepancies. Due to their ease of execution and high effectiveness, these attacks present a serious threat to the security of cryptographic implementations and can even compromise systems with protective mechanisms in place. Recent trends indicate a significant increase in research within this field, marking it as an active area of study in the context of cryptographic algorithm implementations. Therefore, there is a pressing need for a comprehensive study that encompasses fault injection attacks and their countermeasures. In this paper, we introduce fault injection attacks, discussing their characteristics, strengths, and weaknesses. We then explore and compare various attack analysis methods and conclude by examining strategies to mitigate these attacks.&amp;nbsp;&lt;/div&gt;</abstract>
	<keyword_fa>ﺣﻤﻠﻪ ﺍﻟﻘﺎﺀ ﺧﻄﺎ, ﺣﻤﻠﻪ ﻓﻌﺎﻝ, ﺭﻭﺵﻫﺎﯼ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺍﻟﻘﺎﺀ ﺧﻄﺎ, ﺍﻗﺪﺍﻡ ﻣﺘﻘﺎﺑﻞ ﺍﻟﻘﺎﺀ ﺧﻄﺎ</keyword_fa>
	<keyword>Fault Attack, Fault Injection, Active Attack, Fault Countermeasures</keyword>
	<start_page>120</start_page>
	<end_page>134</end_page>
	<web_url>http://monadi.isc.org.ir/browse.php?a_code=A-10-248-5&amp;slc_lang=fa&amp;sid=1</web_url>


<author_list>
	<author>
	<first_name>Mehdi</first_name>
	<middle_name></middle_name>
	<last_name>Farzanegan</last_name>
	<suffix></suffix>
	<first_name_fa>محمد مهدی</first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa>فرزانگان</last_name_fa>
	<suffix_fa></suffix_fa>
	<email>m.farzanegan@yahoo.com</email>
	<code>10031947532846002167</code>
	<orcid>10031947532846002167</orcid>
	<coreauthor>No</coreauthor>
	<affiliation>Cyberspace Research Institute, Shahid Beheshti University, Tehran, Iran</affiliation>
	<affiliation_fa>ﭘﮋﻭﻫﺸﮑﺪﻩ ﻓﻀﺎﯼ ﻣﺠﺎﺯﯼ، ﺩﺍﻧﺸﮕﺎﻩ ﺷﻬﯿﺪ ﺑﻬﺸﺘﯽ، ﺗﻬﺮﺍﻥ، ﺍیﺮﺍﻥ</affiliation_fa>
	 </author>


	<author>
	<first_name></first_name>
	<middle_name></middle_name>
	<last_name></last_name>
	<suffix></suffix>
	<first_name_fa>هادی</first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa>سلیمانی</last_name_fa>
	<suffix_fa></suffix_fa>
	<email>hadi.soleimany@gmail.com</email>
	<code>10031947532846002168</code>
	<orcid>10031947532846002168</orcid>
	<coreauthor>Yes
</coreauthor>
	<affiliation>Cyberspace Research Institute, Shahid Beheshti University, Tehran, Iran</affiliation>
	<affiliation_fa>ﭘﮋﻭﻫﺸﮑﺪﻩ ﻓﻀﺎﯼ ﻣﺠﺎﺯﯼ، ﺩﺍﻧﺸﮕﺎﻩ ﺷﻬﯿﺪ ﺑﻬﺸﺘﯽ، ﺗﻬﺮﺍﻥ، ﺍیﺮﺍﻥ</affiliation_fa>
	 </author>


</author_list>


	</article>
</articleset>
</journal>
