A differential fault attack technique against SPN structures, with application to the AES and KHAZAD

486Citations
Citations of this article
95Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper we describe a differential fault attack technique working against Substitution-Permutation Networks, and requiring very few faulty ciphertexts. The fault model used is realistic, as we consider random faults affecting bytes (faults affecting one only bit are much harder to induce). We implemented our attack on a PC for both the AES and KHAZAD. We are able to break the AES-128 with only 2 faulty ciphertexts, assuming the fault occurs between the antepenultimate and the penultimate MixColumn; this is better than the previous fault attacks against AES[6,10,11]. Under similar hypothesis, KHAZAD is breakable with 3 faulty ciphertexts. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Piret, G., & Quisquater, J. J. (2003). A differential fault attack technique against SPN structures, with application to the AES and KHAZAD. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2779, 77–88. https://doi.org/10.1007/978-3-540-45238-6_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free