In this paper we describe a differential fault attack technique working against Substitution-Permutation Networks, and requiring very few faulty ciphertexts. The fault model used is realistic, as we consider random faults affecting bytes (faults affecting one only bit are much harder to induce). We implemented our attack on a PC for both the AES and KHAZAD. We are able to break the AES-128 with only 2 faulty ciphertexts, assuming the fault occurs between the antepenultimate and the penultimate MixColumn; this is better than the previous fault attacks against AES[6,10,11]. Under similar hypothesis, KHAZAD is breakable with 3 faulty ciphertexts. © Springer-Verlag Berlin Heidelberg 2003.
CITATION STYLE
Piret, G., & Quisquater, J. J. (2003). A differential fault attack technique against SPN structures, with application to the AES and KHAZAD. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2779, 77–88. https://doi.org/10.1007/978-3-540-45238-6_7
Mendeley helps you to discover research relevant for your work.