Meet-in-the-Middle and Impossible Differential Fault Analysis on AES

被引:0
作者
Derbez, Patrick [1 ]
Fouque, Pierre-Alain [1 ]
Leresteux, Delphine [2 ]
机构
[1] Ecole Normale Super, 45 Rue Ulm, F-75230 Paris 05, France
[2] DGA Informat Superior, Rennes, France
来源
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011 | 2011年 / 6917卷
关键词
AES; Differential Fault Analysis; Fault Attack; Impossible Differential Attack; Meet-in-the-Middle Attack; ATTACK;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Since the early work of Piret and Quisquater on fault attacks against AES at CHES 2003, many works have been devoted to reduce the number of faults and to improve the time complexity of this attack. This attack is very efficient as a single fault is injected on the third round before the end, and then it allows to recover the whole secret key in 2(32) in time and memory. However, since this attack, it is an open problem to know if provoking a fault at a former round of the cipher allows to recover the key. Indeed, since two rounds of AES achieve a full diffusion and adding protections against fault attack decreases the performance, some countermeasures propose to protect only the three first and last rounds. In this paper, we give an answer to this problem by showing two practical cryptographic attacks on one round earlier of AES-128 and for all keysize variants. The first attack requires 10 faults and its complexity is around 2(40) in time and memory, an improvement allows only 5 faults and its complexity in memory is reduced to 2(24) while the second one requires either 1000 or 45 faults depending on fault model and recovers the secret key in around 2(40) in time and memory.
引用
收藏
页码:274 / +
页数:4
相关论文
共 32 条
[1]  
[Anonymous], LNCS
[2]  
[Anonymous], SORCERERS APPRENTICE
[3]  
[Anonymous], 2000, 3 AES C
[4]  
[Anonymous], P 5 INT WORKSH SEC P
[5]  
[Anonymous], 2000, PROC AES3
[6]  
[Anonymous], 1997, EUROCRYPT
[7]  
Biham E, 2005, LECT NOTES COMPUT SC, V3557, P359
[8]  
Biham E, 1997, LECT NOTES COMPUT SC, V1294, P513
[9]  
Biryukov A, 2007, LECT NOTES COMPUT SC, V4727, P195
[10]  
Blömer J, 2003, LECT NOTES COMPUT SC, V2742, P162