DocumentCode :
2177827
Title :
Differential Fault Analysis against AES-192 and AES-256 with Minimal Faults
Author :
Kim, Chong Hee
Author_Institution :
Inf. Security Group, Univ. Catholique de Louvain, Louvain-la-Neuve, Belgium
fYear :
2010
fDate :
21-21 Aug. 2010
Firstpage :
3
Lastpage :
9
Abstract :
The naive implementation of AES is known to be vulnerable to Differential Fault Analysis (DFA). We can find the key of AES-128 (AES with 128-bit key) with one pair of correct and faulty cipher texts. Recently several works on the extension of the attack to AES with 192 and 256-bit key have been published. Due to the longer key size and the characteristic of AES key schedule, we need subtle caution in attacking AES-192 and AES-256. We propose new DFA against AES with 192 and 256-bit key. We could retrieve AES-192 key with two pairs of correct and faulty cipher texts. With three pairs we could succeed in finding the key of AES-256. These are the minimal faults among the existing methods.
Keywords :
cryptography; fault diagnosis; scheduling; text analysis; AES key schedule; AES-192 attack; AES-256 attack; advanced encryption standard; correct cipher texts; differential fault analysis; faulty cipher texts; minimal faults; storage capacity 128 bit; storage capacity 192 bit; storage capacity 256 bit; Cryptography; Differential equations; Doped fiber amplifiers; Mathematical model; Polynomials; Schedules; AES; DFA; Differential Fault Analysis; Fault attack;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Fault Diagnosis and Tolerance in Cryptography (FDTC), 2010 Workshop on
Conference_Location :
Santa Barbara, CA
Print_ISBN :
978-1-4244-7844-6
Type :
conf
DOI :
10.1109/FDTC.2010.10
Filename :
5577355
Link To Document :
بازگشت