2014
DOI: 10.1007/s13389-014-0092-8
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of concurrent error detection against differential fault analysis

Abstract: Differential fault analysis (DFA) poses a significant threat to advanced encryption standard (AES). Only a single faulty ciphertext is required to extract the secret key. Concurrent error detection (CED) is widely used to protect AES against DFA. Traditionally, these CEDs are evaluated with uniformly distributed faults, the resulting fault coverage indicates the security of CEDs against DFA. However, DFA-exploitable faults, which are a small subspace of the entire fault space, are not uniformly distributed. Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
24
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
3
2

Relationship

3
7

Authors

Journals

citations
Cited by 72 publications
(24 citation statements)
references
References 53 publications
(136 reference statements)
0
24
0
Order By: Relevance
“…In this case, the designer can add protection to registers using the DDR technique [20]. The FMR for NREPO is around 0.01 for byte faults which most DFA uses [3,13]. An attacker can try 100 fault injections to obtain a single byte fault and thus extract the secret key.…”
Section: Security Analysis Against Dfamentioning
confidence: 99%
“…In this case, the designer can add protection to registers using the DDR technique [20]. The FMR for NREPO is around 0.01 for byte faults which most DFA uses [3,13]. An attacker can try 100 fault injections to obtain a single byte fault and thus extract the secret key.…”
Section: Security Analysis Against Dfamentioning
confidence: 99%
“…It also provides provable security against fault attacks [48]. Therefore, we can add additional registers to the AES and use them to store the round input and output of the normal computation.…”
Section: Fault Coveragementioning
confidence: 99%
“…Fault attacks can compromise the cipher implementation produce faulty ciphertexts for cryptanalysts to retrieve the secret key [1,5,7,11,13,15]. White light, laser beams, glitches, and temperature control are possible manipulation Manuscript means to perform fault attacks [2].…”
Section: Introductionmentioning
confidence: 99%