Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2611765.2611769acmconferencesArticle/Chapter ViewAbstractPublication PageshaspConference Proceedingsconference-collections
research-article

The role of the fault model in DFA against AES

Published: 15 June 2014 Publication History

Abstract

Several attacks based on fault injection have been presented against the AES algorithm. Most of these attacks belong to the class of Differential Fault Analysis. Every attack relies on a specific fault model defined as hypothesis by the authors of the attack. In this paper we analyze the role of the knowledge by the attacker about such fault model on the practical effectiveness of the attacks.

References

[1]
E. Biham and A. Shamir. Differential fault analysis of secret key cryptosystems. In B. S. K. Jr., editor, CRYPTO, volume 1294 of Lecture Notes in Computer Science, pages 513--525. Springer, 1997.
[2]
J. Blömer and J.-P. Seifert. Fault based cryptanalysis of the advanced encryption standard (aes). In R. N. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages 162--181. Springer, 2003.
[3]
D. Boneh, R. A. DeMillo, and R. J. Lipton. On the importance of checking cryptographic protocols for faults (extended abstract). In W. Fumy, editor, EUROCRYPT, volume 1233 of Lecture Notes in Computer Science, pages 37--51. Springer, 1997.
[4]
H. Chen, W. Wu, and D. Feng. Differential fault analysis on clefia. In S. Qing, H. Imai, and G. Wang, editors, ICICS, volume 4861 of Lecture Notes in Computer Science, pages 284--295. Springer, 2007.
[5]
C. Giraud. Dfa on aes. IACR Cryptology ePrint Archive, 2003:8, 2003.
[6]
L. Hemme. A differential fault attack against early rounds of (triple-)des. In M. Joye and J.-J. Quisquater, editors, CHES, volume 3156 of Lecture Notes in Computer Science, pages 254--267. Springer, 2004.
[7]
Y. Li, S. Gomisawa, K. Sakiyama, and K. Ohta. An information theoretic perspective on the differential fault analysis against aes. IACR Cryptology ePrint Archive, 2010:32, 2010.
[8]
A. Moradi, M. T. M. Shalmani, and M. Salmasizadeh. A generalized method of differential fault attack against aes cryptosystem. In L. Goubin and M. Matsui, editors, CHES, volume 4249 of Lecture Notes in Computer Science, pages 91--100. Springer, 2006.
[9]
National Institute for Science and Technology (NIST). Advanced Encryption Standard (FIPS PUB 197), November 2001.
[10]
J. Park, S. Moon, D. Choi, Y. Kang, and J. Ha. Differential fault analysis for round-reduced aes by fault injection. In ETRI Journal, volume 33, pages 434--442, 2011.
[11]
G. Piret and J.-J. Quisquater. A differential fault attack technique against spn structures, with application to the aes and khazad. In C. D. Walter, Çetin Kaya Koç, and C. Paar, editors, CHES, volume 2779 of Lecture Notes in Computer Science, pages 77--88. Springer, 2003.
[12]
J. Takahashi and T. Fukunaga. Improved differential fault analysis on clefia. In L. Breveglieri, S. Gueron, I. Koren, D. Naccache, and J.-P. Seifert, editors, FDTC, pages 25--34. IEEE Computer Society, 2008.
[13]
M. Tunstall and D. Mukhopadhyay. Differential fault analysis of the advanced encryption standard using a single fault. IACR Cryptology ePrint Archive, 2009:575, 2009.

Cited By

View all
  • (2018)Darth's Saber: A Key Exfiltration Attack for Symmetric Ciphers Using Laser Light2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)10.1109/FDTC.2018.00012(23-26)Online publication date: Sep-2018
  • (2018)Fault Attacks on Secure Embedded Software: Threats, Design, and EvaluationJournal of Hardware and Systems Security10.1007/s41635-018-0038-12:2(111-130)Online publication date: 10-May-2018
  • (2017)Analyzing the Fault Injection Sensitivity of Secure Embedded SoftwareACM Transactions on Embedded Computing Systems10.1145/306331116:4(1-25)Online publication date: 28-Jul-2017

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
HASP '14: Proceedings of the Third Workshop on Hardware and Architectural Support for Security and Privacy
June 2014
89 pages
ISBN:9781450327770
DOI:10.1145/2611765
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 June 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. AES
  2. differential fault analysis
  3. fault attacks
  4. fault models

Qualifiers

  • Research-article

Conference

HASP '14
Sponsor:

Acceptance Rates

Overall Acceptance Rate 9 of 13 submissions, 69%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2018)Darth's Saber: A Key Exfiltration Attack for Symmetric Ciphers Using Laser Light2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)10.1109/FDTC.2018.00012(23-26)Online publication date: Sep-2018
  • (2018)Fault Attacks on Secure Embedded Software: Threats, Design, and EvaluationJournal of Hardware and Systems Security10.1007/s41635-018-0038-12:2(111-130)Online publication date: 10-May-2018
  • (2017)Analyzing the Fault Injection Sensitivity of Secure Embedded SoftwareACM Transactions on Embedded Computing Systems10.1145/306331116:4(1-25)Online publication date: 28-Jul-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media