An improved differential fault analysis on AES-256

  • Authors:
  • Sk Subidh Ali;Debdeep Mukhopadhyay

  • Affiliations:
  • Dept. of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, India;Dept. of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, India

  • Venue:
  • AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we present an improved differential fault attack on the Advanced Encryption Standard (AES) with 256-bit key. We show an improved attack which retrieves the AES-256 key using two pairs of fault free and faulty ciphertexts and a brute-force search of 216 with a time complexity 232. The attack retrieves the secret key within approximately 45 minutes, running on desktop Intel Core™2 Duo processor of 3GHz speed. To the best of the knowledge of the authors, this is the most optimized fault attack on AES-256 among reported results requiring only two faulty ciphertexts.