DocumentCode :
2604747
Title :
Fault attack on AES with single-bit induced faults
Author :
Barenghi, Alessandro ; Bertoni, Guido M. ; Breveglieri, Luca ; Pellicioli, Mauro ; Pelosi, Gerardo
Author_Institution :
DEI-Dipt. di Elettron. e Inf., Politec. di Milano, Milan, Italy
fYear :
2010
fDate :
23-25 Aug. 2010
Firstpage :
167
Lastpage :
172
Abstract :
This work presents a differential fault attack against AES employin any key size, regardless of the key scheduling strategy. The presented attack relies on the injection of a single bit flip, and is able to check for the correctness of the injection of the fault a posteriori. This fault model nicely fits the one obtained through underfeeding a computing device employing a low cost tunable power supply unit. This fault injection technique, which has been successfully applied to hardware implementations of AES, receives a further validation in this paper where the target computing device is a system-on-chip based on the widely adopted ARM926EJ-S CPU core. The attack is successfully carried out against two different devices, etched in two different technologies (a generic 130 nm and a low-power oriented 90 nm library) running a software implementation of AES-192 and AES-256 and has been reproduced on multiple instances of the same chip.
Keywords :
cryptography; microcontrollers; system-on-chip; AES; AES-192; AES-256; ARM926EJ-S CPU core; computing device; differential fault attack; fault injection technique; hardware implementation; key scheduling; single bit flip; single-bit induced fault; software implementation; system-on-chip; tunable power supply unit; Program processors; Fault injection attacks; Side channel attacks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance and Security (IAS), 2010 Sixth International Conference on
Conference_Location :
Atlanta, GA
Print_ISBN :
978-1-4244-7407-3
Type :
conf
DOI :
10.1109/ISIAS.2010.5604061
Filename :
5604061
Link To Document :
بازگشت