2012
DOI: 10.1016/j.ins.2012.02.028
|View full text |Cite
|
Sign up to set email alerts
|

Differential fault analysis of AES: Toward reducing number of faults

Abstract: Differential Fault Analysis (DFA) finds the key of a block cipher using differential information between correct and faulty ciphertexts obtained by inducing faults during the computation of ciphertexts. Among many ciphers AES has been the main target of DFA due to its popularity. DFA of AES has also been diversified into several directions: reducing the required number of faults, applying it to multi-byte fault models, extending to AES-192 and AES-256, or exploiting faults induced at an earlier round.This arti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 22 publications
0
11
0
Order By: Relevance
“…Bogdanov et al [55] presented a technique of cryptanalysis with bicliques, also leading to a non-practical complexity recovering the key. Kim [56] explained also theoretically how to apply differential fault analysis to reduce the required number of faults in AES-192 and AES-256.…”
Section: Accessmentioning
confidence: 99%
“…Bogdanov et al [55] presented a technique of cryptanalysis with bicliques, also leading to a non-practical complexity recovering the key. Kim [56] explained also theoretically how to apply differential fault analysis to reduce the required number of faults in AES-192 and AES-256.…”
Section: Accessmentioning
confidence: 99%
“…Fault is injected by giving external 2 Mathematical Problems in Engineering impact on a device with voltage variation, glitch, laser, and so forth. Since the first DFA on DES proposed by Biham and Shamir [19], this technique has been successfully applied to many other block ciphers, for example, AES [20][21][22][23], CLEFIA [24,25], SM4 [26], and ARIA [27].…”
Section: Introductionmentioning
confidence: 99%
“…This attack is commonly used to analyze the security of cryptosystems. DFA have been employed to attack several block ciphers where DES [3,4], AES [5][6][7][8][9][10][11], PRINTCIPHER [12], Camellia [13], CALEFIA [14,15], RC4 [16], SMS4 [17], and ARIA [18] are examples. In general, there are two techniques to apply a DFA attack on a block cipher.…”
Section: Introductionmentioning
confidence: 99%