2003
DOI: 10.1007/3-540-45067-x_11
|View full text |Cite
|
Sign up to set email alerts
|

Differential Fault Analysis on AES Key Schedule and Some Countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
83
0

Year Published

2004
2004
2018
2018

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 107 publications
(84 citation statements)
references
References 6 publications
1
83
0
Order By: Relevance
“…These attacks exploit the highly regular structure of the AES key schedule in order to infer bytes of the key through corrupting one or more bytes during the expansion of the last round key bits. In particular, the attacks proposed by Giraud et al in [42] and by Chen et al in [46] exploit a single byte corruption introduced after the key schedule procedure has been performed, and are thus able to obtain a precise fault that does not propagate to the keys which are derived from it. While this fault model is reasonable whenever the key schedule is precomputed and its result stored in some kind of permanent memory, it is not possible to attack AES implementations which perform key expansion on the fly.…”
Section: B Attacks On Aesmentioning
confidence: 99%
“…These attacks exploit the highly regular structure of the AES key schedule in order to infer bytes of the key through corrupting one or more bytes during the expansion of the last round key bits. In particular, the attacks proposed by Giraud et al in [42] and by Chen et al in [46] exploit a single byte corruption introduced after the key schedule procedure has been performed, and are thus able to obtain a precise fault that does not propagate to the keys which are derived from it. While this fault model is reasonable whenever the key schedule is precomputed and its result stored in some kind of permanent memory, it is not possible to attack AES implementations which perform key expansion on the fly.…”
Section: B Attacks On Aesmentioning
confidence: 99%
“…In the following, we present a technique that avoids to increase the time complexity too much by using a hash 10 (0), K 10 (7), K 10 (10), K 10 (13), U 9 (0)}. These two hash tables have for input index 5 values of S 8 (0) ⊕S 8 (0) and for output {K 10 (0), K 10 (7), K 10 (10), K 10 (13), U 9 (0)}.…”
Section: Recovery K 10mentioning
confidence: 99%
“…Using many pairs of correct and faulty ciphertexts, we can reduce the possible key space. We reuse four times the no difference computation algorithm for each column of S 10 . In this attack, the attacker does not use fault position to retrieve the last subkey bytes.…”
Section: From Impossible Differential To Inequation Systemmentioning
confidence: 99%
“…It was first proposed by E. Biham and A. Shamir on DES 2 in 1997. The similar attacks have been applied to AES [3][4][5][6][7][8] , Triple-DES 9 , RC4 10 , Camellia 11 , ARIA 12 , SMS4 [13][14] , PRESENT 15 and so on. The DFA exploits easily accessible information like input-output behavior under malfunctions, amplifies and evaluates the leaked information with the help of mathematical methods.…”
Section: Introductionmentioning
confidence: 99%