This paper describes an attack on cryptographic devices called Differential Behavioral Analysis (or DBA). This is an hybrid attack between two already powerful attacks: differential power analysis (DPA) for the statistical treatment and safe-error attack for the fault type. DBA, simulated on an algorithmic model of AES appears to be very efficient. The attacker is able to recover the entire secret key with byte-wise "stuck-at" faults injected repetitively. A theorical as well as a more realistic approach are presented. © Springer-Verlag Berlin Heidelberg 2007.
CITATION STYLE
Robisson, B., & Manet, P. (2007). Differential behavioral analysis. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4727 LNCS, pp. 413–426). Springer Verlag. https://doi.org/10.1007/978-3-540-74735-2_28
Mendeley helps you to discover research relevant for your work.