2013 Workshop on Fault Diagnosis and Tolerance in Cryptography 2013
DOI: 10.1109/fdtc.2013.18
|View full text |Cite
|
Sign up to set email alerts
|

Fault Attacks on AES with Faulty Ciphertexts Only

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
92
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 138 publications
(92 citation statements)
references
References 8 publications
0
92
0
Order By: Relevance
“…It uses the knowledge of the localization bias of the fault model to recover the secret key [3,20]. DFIA is similar to side-channel analysis techniques in its use of distinguishers to distinguish the correct key hypothesis from the incorrect ones.…”
Section: Differential Fault Intensity Analysis (Dfia)mentioning
confidence: 99%
“…It uses the knowledge of the localization bias of the fault model to recover the secret key [3,20]. DFIA is similar to side-channel analysis techniques in its use of distinguishers to distinguish the correct key hypothesis from the incorrect ones.…”
Section: Differential Fault Intensity Analysis (Dfia)mentioning
confidence: 99%
“…We discuss and compare several recently proposed biasedfault attacks, including Fault Sensitivity Analysis (FSA, [1]), Non-Uniform Error Value Analysis (NUEVA, [2]), Non-Uniform Faulty Value Analysis (NUFVA, [3]) and Differential Fault Intensity Analysis (DFIA, [4]). We show that these attacks share common ideas, and hence, their efficiency can be compared.…”
Section: Introductionmentioning
confidence: 99%
“…In [24] the authors propose to use Maximum likelihood, the mean Hamming weight or the Squared Euclidean Imbalance(SEI) as distinguishers. The Maximum likelihood approach requires an exact knowledge of the bias and is therefore discarded as an identifier.…”
Section: Attack For the Biased Fault Modelmentioning
confidence: 99%
“…This key addition (XOR) results in an exploitable relationship between the faulted output and the key. ChaCha and Salsa, however, have a different structure and use a hash function and not a block cipher as their source of randomness making the attacks proposed in [22][23][24] not applicable.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation