Differential fault analysis on AES key schedule and some countermeasures

120Citations
Citations of this article
46Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper describes a DFA attack on the AES key schedule. This fault model assumes that the attacker can induce a single byte fault on the round key. It efficiently finds the key of AES-128 with feasible computation and less than thirty pairs of correct and faulty ciphertexts. Several countermeasures are also proposed. This weakness can be resolved without modifying the structure of the AES algorithm and without decreasing the efficiency. © 2003 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Chen, C. N., & Yen, S. M. (2003). Differential fault analysis on AES key schedule and some countermeasures. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2727 LNCS, pp. 118–129). https://doi.org/10.1007/3-540-45067-X_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free