A new and optimal chosen-message attack on RSA-type cryptosystems
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
A Practical Implementation of the Timing Attack
CARDIS '98 Proceedings of the The International Conference on Smart Card Research and Applications
ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
Differential Fault Analysis of Secret Key Cryptosystems
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults
Proceedings of the 5th International Workshop on Security Protocols
Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults
Designs, Codes and Cryptography
DFA Mechanism on the AES Key Schedule
FDTC '07 Proceedings of the Workshop on Fault Diagnosis and Tolerance in Cryptography
Impossible differential cryptanalysis of reduced-round ARIA and Camellia
Journal of Computer Science and Technology
Side-Channel Attacks against ARIA on Active RFID Device
ICCIT '07 Proceedings of the 2007 International Conference on Convergence Information Technology
Faults, Injection Methods, and Fault Attacks
IEEE Design & Test
Improved Impossible Differential Cryptanalysis of ARIA
ISA '08 Proceedings of the 2008 International Conference on Information Security and Assurance (isa 2008)
Differential fault analysis on the ARIA algorithm
Information Sciences: an International Journal
New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Improved Differential Fault Analysis on CLEFIA
FDTC '08 Proceedings of the 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography
Differential fault analysis on the contracting UFN structure, with application to SMS4 and MacGuffin
Journal of Systems and Software
Differential Fault Analysis on DES Middle Rounds
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
Practical Fault Attack on a Cryptographic LSI with ISO/IEC 18033-3 Block Ciphers
FDTC '09 Proceedings of the 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography
FDTC '09 Proceedings of the 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography
Investigations of power analysis attacks and countermeasures for ARIA
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Differential fault analysis on CLEFIA
ICICS'07 Proceedings of the 9th international conference on Information and communications security
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
Differential Fault Analysis against AES-192 and AES-256 with Minimal Faults
FDTC '10 Proceedings of the 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography
Fault Attacks and Countermeasures on Vigilant's RSA-CRT Algorithm
FDTC '10 Proceedings of the 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography
Impossible fault analysis of RC4 and differential fault analysis of RC4
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Differential power analysis on block cipher ARIA
HPCC'05 Proceedings of the First international conference on High Performance Computing and Communications
A generalized method of differential fault attack against AES cryptosystem
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Experimenting with faults, lattices and the DSA
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Hi-index | 0.00 |
Differential fault analysis exploits faults to find secret information stored in a cryptographic device. It utilizes differential information between correct and faulty ciphertexts. We introduce new techniques to improve the previous differential fault analysis of ARIA. ARIA is a general-purpose involutional SPN (substitution permutation network) block cipher and was established as a Korean standard block cipher algorithm in 2004. While the previous method by Li et al. requires 45 faults, our method needs 13 faults to retrieve the 128-bit secret key of ARIA. If access to the decryption oracle is allowed, our method only needs 7 faults. We analyze the characteristics of the diffusion layer of ARIA in detail, which leads us to reduce the number of required faults to find the key.