An improved differential fault analysis attack to AES using reduced searching space

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Differential Power Analysis against AES proved to be effective, with use mask techniques, we can truncate the relevance and defense DPA attacks successfully. In this paper, we introduce a new mean called DFA (Differential Fault Attack), DFA has been shown successfully to attack AES algorithm with masking. We inject a fault to the intermediate results and other general form to obtain the ciphertext with faults, using the ciphertext we can recover the keys. Firstly, we construct the Sbox/InvSbox distribution tables to make the results sets space is less than 28 with two correct/fault ciphertexts pairs, even, in most cases, the set space are strict in 22. Secondly, we also demonstrated that the model of DFA we constructed can ignore the masking techniques and propose some methods to recover the keys with less time consuming and reduced searching space. Lastly, we make the module into an application and prove the module is effective. © Springer International Publishing Switzerland 2013.

Cite

CITATION STYLE

APA

Cai, Z., Wang, Y., & Li, R. (2013). An improved differential fault analysis attack to AES using reduced searching space. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8300 LNCS, pp. 441–449). https://doi.org/10.1007/978-3-319-03584-0_33

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free