Differential fault analysis of the advanced encryption standard

3Citations
Citations of this article
34Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In October 2000, Rijndael was selected as the Advanced Encryption Standard (AES). Since then, this cryptosystem has been widely used to ensure the confidentiality of information stored in embedded devices. Therefore, over the last decade many researchers have studied this algorithm, leading to the publication of many Differential Fault Analyses (DFAs) on the AES. In this chapter, we present the state of the art of DFA of the AES. After describing the AES, we present in detail three of the most efficient DFAs on this cryptosystem. These attacks have different characteristics, allowing an attacker to recover the secret key from one faulty ciphertext or if faults have been induced in the middle rounds of the AES. We then present a table summarizing the characteristics of each and every DFA on the AES published so far. Finally, we present the main countermeasures proposed to counter fault injection attacks on the AES.

Cite

CITATION STYLE

APA

Giraud, C. (2012). Differential fault analysis of the advanced encryption standard. In Information Security and Cryptography (Vol. 17, pp. 55–72). Springer International Publishing. https://doi.org/10.1007/978-3-642-29656-7_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free