A type of side-channel attack first described by Eli Biham and Adi Shamir in their 1997 paper: "Differential Fault Analysis of Secret Key Cryptosystems". Here, the cryptanalyst judiciously and deliberately induces transient faults into a hardware cryptosystem in order to trick it into divulging information about the keys. Biham and Shamir showed that the attack is very powerful, capable of recovering a full DES key from a commercially available sealed tamper-resistant DES encryptor by analyzing 50 to 200 ciphertexts generated from unknown but related plaintexts. The attack is also useful even against hardware cryptosystems whose internal structure is totally a mystery, such as the Capstone chip before it was declassified.