Combined fault and side-channel attack on protected implementations of AES

49Citations
Citations of this article
37Readers
Mendeley users who have this article in their library.

Abstract

The contribution of this paper is twofold: (1) a novel fault injection attack against AES, based on a new fault model, is proposed. Compared to state-of-the-art attacks, this fault model advantage is to relax constraints on the fault location, and then reduce the a priori knowledge on the implementation. Moreover, the attack algorithm is very simple and leaves room for optimization with respect to specific cases; (2) the fault attack is combined with side-channel analysis in order to defeat fault injection resistant and masked AES implementations. More precisely, our fault injection attack works well even when the attacker has only access to the faulty ciphertexts through a side-channel. Furthermore, the attacks presented in this paper can be extended to any SP-Network. © 2011 IFIP International Federation for Information Processing.

Cite

CITATION STYLE

APA

Roche, T., Lomné, V., & Khalfallah, K. (2011). Combined fault and side-channel attack on protected implementations of AES. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7079 LNCS, pp. 65–83). https://doi.org/10.1007/978-3-642-27257-8_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free