Fault based cryptanalysis of the advanced encryption standard (AES)

被引:0
|
作者
Blömer, J [1 ]
Seifert, JP [1 ]
机构
[1] Univ Gesamthsch Paderborn, D-33095 Paderborn, Germany
来源
关键词
AES; fault attacks; implementation issues; secure banking; smart cards;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper we describe several,fault attacks on the Advanced Encryption Standard (AES). First, using optical/eddy current fault induction attacks as recently publicly presented by Skorobogatov, Anderson and Quisquater, Samyde [SA,QS], we-present an implementation independent fault attack on AES. This attack is able to determine the complete 128-bit secret key of a sealed tamper-proof smart-card by generating 128 faulty cipher texts. Second, we present several implementation-dependent fault attacks on AES. These attacks rely on the observation that due to the AES's known timing analysis vulnerability (as pointed out by Koeune and Quisquater [KQ]), any implementation of the AES must ensure a data independent timing behavior for the so called AES's xtime operation. We present fault attacks on AES based on various timing analysis resistant implementations of the xtime-operation. Our strongest attack in this direction uses a very liberal fault model and requires only 256 faulty encryptions to determine a 128-bit key.
引用
收藏
页码:162 / 181
页数:20
相关论文
共 50 条
  • [1] Impossible differential cryptanalysis of 7-round Advanced Encryption Standard (AES)
    Phan, RCW
    INFORMATION PROCESSING LETTERS, 2004, 91 (01) : 33 - 38
  • [2] Advanced Encryption Standard (AES)
    Network Box
    Netw. Secur., 2009, 12 (8-12):
  • [3] Advanced Encryption Standard - Cryptanalysis Research
    Alghazzawi, Daniyal M.
    Hasan, Syed Hamid
    Trigui, Mohamed Salim
    2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 660 - 667
  • [4] Digital Image Encryption Based On Advanced Encryption Standard(AES) Algorithm
    Zhang, Qi
    Qun, Ding
    2015 FIFTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2015, : 1218 - 1221
  • [5] Realising AES - Advanced encryption standard
    Daemon, J.
    Software World, 2001, 32 (04):
  • [6] On The Security of Advanced Encryption Standard (AES)
    Boussif, Mohamed
    8th International Conference on Engineering, Applied Sciences, and Technology, ICEAST 2022 - Proceedings, 2022, : 83 - 88
  • [7] Impossible differential cryptanalysis of Advanced Encryption Standard
    Jie Chen
    YuPu Hu
    YueYu Zhang
    Science in China Series F: Information Sciences, 2007, 50 : 342 - 350
  • [8] Impossible differential cryptanalysis of advanced encryption standard
    Chen Jie
    Hu Yupu
    Zhang Yueyu
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2007, 50 (03): : 342 - 350
  • [10] An Overview of Cryptanalysis Research for the Advanced Encryption Standard
    Kaminsky, Alan
    Kurdziel, Michael
    Radziszowski, Stanislaw
    MILITARY COMMUNICATIONS CONFERENCE, 2010 (MILCOM 2010), 2010, : 1310 - 1316