Title :
Revisit fault sensitivity analysis on WDDL-AES
Author :
Li, Yang ; Ohta, Kazuo ; Sakiyama, Kazuo
Author_Institution :
Dept. of Inf., Univ. of Electro-Commun., Chofu, Japan
Abstract :
This paper revisits and improves the fault sensitivity analysis (FSA) attack on WDDL-AES. At CHES 2010, the FSA attack on WDDL-AES was proposed by Li et al. based on the delay timing difference for complementary wires. In their attack, the vulnerability of WDDL-AES mainly comes from the implementation deficiency rather than the WDDL technique itself. On the contrary, we explain that a well-implemented WDDL-AES also has the vulnerability against the FSA attack due to the input-data dependency for the critical delay of the WDDL S-box. We explain the observed ciphertext-bit dependency for the fault sensitivity (FS) data when the clock glitch is injected at the final AES round. By proposing a new distinguisher, our FSA attack can successfully retrieve the secret key information for WDDL-AES on SASEBO-R.
Keywords :
cryptography; fault tolerant computing; CHES 2010; SASEBO-R; WDDL S-box; WDDL-AES; attack vulnerability; ciphertext-bit dependency; clock glitch; complementary wires; delay timing difference; fault sensitivity analysis; input-data dependency; secret key information; wave dynamic differential logic; Circuit faults; Clocks; Delay; Doped fiber amplifiers; Sensitivity; Wires;
Conference_Titel :
Hardware-Oriented Security and Trust (HOST), 2011 IEEE International Symposium on
Conference_Location :
San Diego CA
Print_ISBN :
978-1-4577-1059-9
DOI :
10.1109/HST.2011.5955013