2013
DOI: 10.1007/978-3-642-40026-1_2
|View full text |Cite
|
Sign up to set email alerts
|

Electromagnetic Glitch on the AES Round Counter

Abstract: Abstract. This article presents a Round Addition Analysis on a software implementation of the Advanced Encryption Standard (aes) algorithm. The round keys are computed on-the-fly during each encryption. A non-invasive transient fault injection is achieved on the aes round counter. The attack is performed by injecting a very short electromagnetic glitch on a 32-bit microcontroller based on the arm Cortex-M3 processor. Using this experimental setup, we are able to disrupt the round counter increment at the end o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(38 citation statements)
references
References 10 publications
0
38
0
Order By: Relevance
“…Assuming a wrong PIN, function byteArrayCompare returns a value BOOL_FALSE (which 2 A smaller monitor can be used for jump attacks in this case, see Figure 4. 3 An additional state has to be added to MTI in this case, see is assigned to _t1). Thus, value 0 is assigned to variable _t2 as a result of the logical instruction _t2:=(_t1 == BOOL_TRUE).…”
Section: Monitorsmentioning
confidence: 99%
“…Assuming a wrong PIN, function byteArrayCompare returns a value BOOL_FALSE (which 2 A smaller monitor can be used for jump attacks in this case, see Figure 4. 3 An additional state has to be added to MTI in this case, see is assigned to _t1). Thus, value 0 is assigned to variable _t2 as a result of the logical instruction _t2:=(_t1 == BOOL_TRUE).…”
Section: Monitorsmentioning
confidence: 99%
“…On the control flow, the most popular fault models are to skip the execution of a specific instruction (i.e, instruction skip) [42], [43], multiple instruction skips [44], [45], replacing an instruction with another one (i.e, instruction modification) [46], [21], changing the result of a conditional branch [47], [48], and tampering with loop counters [49], [50].…”
Section: A Fault Modelsmentioning
confidence: 99%
“…In [8], the authors performed an attack on an up-to-date 32bit microcontroller based on the ARM Cortex-M3 processor. Their attack targeted the round counter of a software AES implementation.…”
Section: General Purpose Cpusmentioning
confidence: 99%