Differential Fault Attacks against AES Tampering with the Instruction Flow

被引:0
作者
Mella, Silvia [1 ]
Melzani, Filippo [2 ]
Visconti, Andrea [1 ]
机构
[1] Univ Milan, Milan, Italy
[2] STMicroelectronics, Agrate Brianza, Italy
来源
2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT) | 2014年
关键词
Fault Attacks; AES; Differential Fault Analysis; KEY SCHEDULE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Most of the attacks against the Advanced Encryption Standard based on faults mainly aim at either altering the temporary value of the message or key during the computation. Few other attacks tamper the instruction flow in order to reduce the number of round iterations to one or two. In this work, we extend this idea and present fault attacks against the AES algorithm that exploit the misbehavior of the instruction flow during the last round. In particular, we consider faults that cause the algorithm to skip, repeat or corrupt one of the four AES round functions. In principle, these attacks are applicable against both software and hardware implementations, by targeting the execution of instructions or the control logic. As conclusion countermeasures against fault attacks must also cover the instruction flow and not only the processed data.
引用
收藏
页码:439 / 444
页数:6
相关论文
共 50 条
[41]   SFP: Providing System Call Flow Protection against Software and Fault Attacks [J].
Schilling, Robert ;
Nasahl, Pascal ;
Unterguggenberger, Martin ;
Mangard, Stefan .
PROCEEDINGS OF THE 11TH INTERNATIONAL WORKSHOP ON HARDWARE AND ARCHITECTURAL SUPPORT FOR SECURITY AND PRIVACY, HASP 2022, 2022, :18-26
[42]   A New Differential Fault Attack on SPN Structure, with Application to AES Cipher [J].
Li, Wei ;
Xia, Xiaoling ;
Gu, Dawu ;
Liu, Zhiqiang ;
Li, Juanru ;
Liu, Ya .
JOURNAL OF COMPUTERS, 2011, 6 (02) :216-223
[43]   Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes [J].
Bao, Zhenzhen ;
Ding, Lin ;
Guo, Jian ;
Wang, Haoyang ;
Zhang, Wenying .
IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (04) :318-347
[44]   Fault Attacks Against EMV Signatures [J].
Coron, Jean-Sebastien ;
Naccache, David ;
Tibouchi, Mehdi .
TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 :208-+
[45]   Instruction-Fetching Attack and Practice in Collision Fault Attack on AES [J].
Jiang, Huilong ;
Zhu, Xiang ;
Han, Jianwei .
SYMMETRY-BASEL, 2022, 14 (10)
[46]   Improved Differential Power Analysis Attacks on AES Hardware Implementations [J].
Han, Yu ;
Zou, Xuecheng ;
Liu, Zhenglin ;
Chen, Yicheng .
2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, :2230-2233
[47]   Combined Fault and Side-Channel Attacks on the AES Key Schedule [J].
Dassance, Francois ;
Venelli, Alexandre .
2012 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC), 2012, :63-71
[48]   Practical complexity differential cryptanalysis and fault analysis of AES [J].
Tunstall, Michael .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (03) :219-230
[49]   An algebraic masking method to protect AES against power attacks [J].
Courtois, Nicolas T. ;
Goubin, Louis .
INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005, 2006, 3935 :199-209
[50]   Analysis of countermeasures against access driven cache attacks on AES [J].
Bloemer, Johannes ;
Krummel, Volker .
SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 :96-109