The Design of Rijndael
Differential Fault Attacks on Elliptic Curve Cryptosystems
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Differential Fault Analysis of Secret Key Cryptosystems
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Low Cost Attacks on Tamper Resistant Devices
Proceedings of the 5th International Workshop on Security Protocols
Fault Induction Attacks, Tamper Resistance, and Hostile Reverse Engineering in Perspective
FC '97 Proceedings of the First International Conference on Financial Cryptography
Optical Fault Induction Attacks
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults
Designs, Codes and Cryptography
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
On the importance of checking cryptographic protocols for faults
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Differential fault analysis on the ARIA algorithm
Information Sciences: an International Journal
Error detection and error correction procedures for the advanced encryption standard
Designs, Codes and Cryptography
Differential Behavioral Analysis
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
High-Performance Concurrent Error Detection Scheme for AES Hardware
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
Perturbating RSA Public Keys: An Improved Attack
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Differential fault analysis on the contracting UFN structure, with application to SMS4 and MacGuffin
Journal of Systems and Software
Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Differential Fault Analysis on DES Middle Rounds
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
Journal of Electronic Testing: Theory and Applications
Differential fault analysis on Camellia
Journal of Systems and Software
Differential fault analysis on CLEFIA
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Countermeasures against fault attacks on software implemented AES: effectiveness and cost
WESS '10 Proceedings of the 5th Workshop on Embedded Systems Security
Flash memory 'bumping' attacks
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
Differential fault analysis of the advanced encryption standard using a single fault
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Meet-in-the-middle and impossible differential fault analysis on AES
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Design and characterisation of an AES chip embedding countermeasures
International Journal of Intelligent Engineering Informatics
A generalized method of differential fault attack against AES cryptosystem
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Fault based collision attacks on AES
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
When clocks fail: on critical paths and clock faults
CARDIS'10 Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application
Secret key leakage from public key perturbation of DLP-Based cryptosystems
Cryptography and Security
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
Differential fault analysis of AES-128 key schedule using a single multi-byte fault
CARDIS'11 Proceedings of the 10th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Combined fault and side-channel attack on protected implementations of AES
CARDIS'11 Proceedings of the 10th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Differential fault analysis of AES: Toward reducing number of faults
Information Sciences: an International Journal
Linear fault analysis of block ciphers
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Error detecting AES using polynomial residue number systems
Microprocessors & Microsystems
Fault analysis study of the block cipher FOX64
Multimedia Tools and Applications
A fault-resistant implementation of AES using differential bytes between input and output
The Journal of Supercomputing
Hi-index | 0.00 |
In this paper we describe two different DFA attacks on the AES. The first one uses a fault model that induces a fault on only one bit of an intermediate result, hence allowing us to obtain the key by using 50 faulty ciphertexts for an AES-128. The second attack uses a more realistic fault model: we assume that we may induce a fault on a whole byte. For an AES-128, this second attack provides the key by using less than 250 faulty ciphertexts. If we extend our hypothesis by supposing that the attacker can choose the byte affected by the fault, our bit-fault attack requires 35 faulty ciphertexts to obtain the secret key and our byte-fault attack requires only 31 faulty ciphertexts.