Differential Fault Attacks against AES Tampering with the Instruction Flow

被引:0
作者
Mella, Silvia [1 ]
Melzani, Filippo [2 ]
Visconti, Andrea [1 ]
机构
[1] Univ Milan, Milan, Italy
[2] STMicroelectronics, Agrate Brianza, Italy
来源
2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT) | 2014年
关键词
Fault Attacks; AES; Differential Fault Analysis; KEY SCHEDULE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Most of the attacks against the Advanced Encryption Standard based on faults mainly aim at either altering the temporary value of the message or key during the computation. Few other attacks tamper the instruction flow in order to reduce the number of round iterations to one or two. In this work, we extend this idea and present fault attacks against the AES algorithm that exploit the misbehavior of the instruction flow during the last round. In particular, we consider faults that cause the algorithm to skip, repeat or corrupt one of the four AES round functions. In principle, these attacks are applicable against both software and hardware implementations, by targeting the execution of instructions or the control logic. As conclusion countermeasures against fault attacks must also cover the instruction flow and not only the processed data.
引用
收藏
页码:439 / 444
页数:6
相关论文
共 50 条
  • [31] An Extension of Differential Fault Analysis on AES
    Li, Wei
    Wang, Yong
    Gu, Dawu
    Li, Juanru
    Liu, Zhiqiang
    [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 443 - +
  • [32] ON THE RELATED-KEY ATTACKS AGAINST AES
    Daemen, Joan
    Rijmen, Vincent
    [J]. PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2012, 13 (04): : 395 - 400
  • [33] Meet-in-the-Middle and Impossible Differential Fault Analysis on AES
    Derbez, Patrick
    Fouque, Pierre-Alain
    Leresteux, Delphine
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 274 - +
  • [34] Differential fault analysis of AES: towards reaching its limits
    Ali, Sk Subidh
    Mukhopadhyay, Debdeep
    Tunstall, Michael
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) : 73 - 97
  • [35] Table Redundancy Method for Protecting Against Fault Attacks
    Lee, Seungkwang
    Jho, Nam-Su
    Kim, Myungchul
    [J]. IEEE ACCESS, 2021, 9 : 92214 - 92223
  • [36] Differential Fault Analysis on AES by Round Reduction
    Bae, KiSeok
    Moon, SangJae
    Choi, DooHo
    Choi, YongJe
    Choi, Doo-sik
    Ha, JaeCheol
    [J]. 2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 607 - 612
  • [37] Differential fault analysis by reducing AES round
    Bae, KiSeok
    Moon, SangJae
    Choi, DooHo
    Choi, YongJe
    Choi, DooSik
    Ha, JaeCheol
    [J]. Advances in Information Sciences and Service Sciences, 2012, 4 (11): : 103 - 113
  • [38] Correlation Photonic Emission Attacks Against AES Algorithm
    Wang, Hong-sheng
    Xu, Zi-yan
    Zhang, Yang
    Chen, Kai-yan
    Wu, Ling-an
    [J]. PROCEEDINGS OF THE 2016 5TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS AND COMPUTER SCIENCE, 2016, 80 : 512 - 517
  • [39] Cache-collision timing attacks against AES
    Bonneau, Joseph
    Mironov, Ilya
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 201 - 215
  • [40] SCFI: State Machine Control-Flow Hardening Against Fault Attacks
    Nasahl, Pascal
    Unterguggenberger, Martin
    Nagpal, Rishub
    Schilling, Robert
    Schrammel, David
    Mangard, Stefan
    [J]. 2023 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2023,