[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

An Improved Differential Fault Analysis on AES-256

  • Conference paper
Progress in Cryptology – AFRICACRYPT 2011 (AFRICACRYPT 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6737))

Included in the following conference series:

Abstract

In this paper we present an improved differential fault attack on the Advanced Encryption Standard (AES) with 256-bit key. We show an improved attack which retrieves the AES-256 key using two pairs of fault free and faulty ciphertexts and a brute-force search of 216 with a time complexity 232. The attack retrieves the secret key within approximately 45 minutes, running on desktop Intel Core TM 2 Duo processor of 3GHz speed. To the best of the knowledge of the authors, this is the most optimized fault attack on AES-256 among reported results requiring only two faulty ciphertexts.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. National Institute of Standards and Technology, Advanced Encryption Standard, NIST FIPS PUB 197 (2001)

    Google Scholar 

  2. Ali, S., Mukhopadhyay, D.: Acceleration of Differential Fault Analysis of the Advanced Encryption Standard Using Single Fault. Cryptology ePrint Archive, Report 2010/451 (2010), http://eprint.iacr.org/

  3. Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The Sorcerers Apprentice Guide to Fault Attacks. Cryptology ePrint Archive, Report 2004/100 (2004), http://eprint.iacr.org/

  4. Barenghi, A., Bertoni, G., Parrinello, E., Pelosi, G.: Low Voltage Fault Attacks on the RSA Cryptosystem. In: Breveglieri, et al. (eds.) [8], pp. 23–31

    Google Scholar 

  5. Biham, E., Shamir, A.: Differential Fault Analysis of Secret Key Cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513–525. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  6. Blömer, J., Seifert, J.-P.: Fault Based Cryptanalysis of the Advanced Encryption Standard (AES). In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 162–181. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  7. Boneh, D., DeMillo, R.A., Lipton, R.J.: On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37–51. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  8. Breveglieri, L., Gueron, S., Koren, I., Naccache, D., Seifert, J.-P. (eds.): Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2009, Lausanne, Switzerland. IEEE Computer Society, Los Alamitos (September 2009)

    Google Scholar 

  9. Dusart, P., Letourneux, G., Vivolo, O.: Differential Fault Analysis on A.E.S. Cryptology ePrint Archive, Report 2003/010 (2003), http://eprint.iacr.org/

  10. Fukunaga, T., Takahashi, J.: Practical Fault Attack on a Cryptographic LSI with ISO/IEC 18033-3 Block Ciphers. In: Breveglieri, et al. (eds.) [8], pp. 84–92

    Google Scholar 

  11. Giraud, C.: DFA on AES. Cryptology ePrint Archive, Report 2003/008 (2003), http://eprint.iacr.org/

  12. Giraud, C., Thillard, A.: Piret and Quisquater’s DFA on AES Revisited. Cryptology ePrint Archive, Report 2010/440 (2010), http://eprint.iacr.org/

  13. Gomisawa, S., Li, Y., Takahashi, J., Fukunaga, T., Sasaki, Y., Sakiyama, K., Ohta, K.: Efficient Differential Fault Analysis for AES. Cryptology ePrint Archive, Report 2010/336 (2010), http://eprint.iacr.org/

  14. Kim, C.H.: Differential fault analysis against AES-192 and AES-256 with minimal faults. Slides of the presentation at FDTC 2010 (2010), http://sites.uclouvain.be/security/download/slides/Kim-2010-fdtc-slides.pdf

  15. Kim, C.H.: Differential Fault Analysis against AES-192 and AES-256 with Minimal Faults. In: FDTC, pp. 3–9 (2010)

    Google Scholar 

  16. Li, Y., Gomisawa, S., Sakiyama, K., Ohta, K.: An Information Theoretic Perspective on the Differential Fault Analysis against AES. Cryptology ePrint Archive, Report 2010/032 (2010), http://eprint.iacr.org/

  17. Moradi, A., Shalmani, M.T.M., Salmasizadeh, M.: A Generalized Method of Differential Fault Attack Against AES Cryptosystem. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 91–100. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  18. Mukhopadhyay, D.: An Improved Fault Based Attack of the Advanced Encryption Standard. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 421–434. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  19. Piret, G., Quisquater, J.-J.: A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 77–88. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  20. Takahashi, J., Fukunaga, T.: Differential Fault Analysis on AES with 192 and 256-Bit Keys. Cryptology ePrint Archive, Report 2010/023 (2010), http://eprint.iacr.org/

  21. Tunstall, M., Mukhopadhyay, D.: Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault. Cryptology ePrint Archive, Report 2009/575 (2009), http://eprint.iacr.org/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ali, S., Mukhopadhyay, D. (2011). An Improved Differential Fault Analysis on AES-256. In: Nitaj, A., Pointcheval, D. (eds) Progress in Cryptology – AFRICACRYPT 2011. AFRICACRYPT 2011. Lecture Notes in Computer Science, vol 6737. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21969-6_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21969-6_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21968-9

  • Online ISBN: 978-3-642-21969-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics