2021 Asian Hardware Oriented Security and Trust Symposium (AsianHOST) 2021
DOI: 10.1109/asianhost53231.2021.9699812
|View full text |Cite
|
Sign up to set email alerts
|

A Correlation Fault Attack on Rotating S-Box Masking AES

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…In addition, it has been shown that cryptographic designs with mask protection can also be vulnerable to fault attack. Although Bae et al [25] have proved that the AES design using Akkar and Giraud's mask can be secure against fault attack, it is generally accepted that masking does not provide sufficient protection against fault attack [3,26] . FRA has been proposed to break masked AES by Wang et al [10] They inject clock glitches into the critical path of S-Box so that the mask fails to protect the byte substitution, which would make it easier to attack the protected design.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, it has been shown that cryptographic designs with mask protection can also be vulnerable to fault attack. Although Bae et al [25] have proved that the AES design using Akkar and Giraud's mask can be secure against fault attack, it is generally accepted that masking does not provide sufficient protection against fault attack [3,26] . FRA has been proposed to break masked AES by Wang et al [10] They inject clock glitches into the critical path of S-Box so that the mask fails to protect the byte substitution, which would make it easier to attack the protected design.…”
Section: Related Workmentioning
confidence: 99%
“…At present, the commonly used symmetric encryption algorithms include SM4, AES, 3DES, RC4, and other algorithms. The AES algorithm uses a complex key scheduling algorithm, and the decryption algorithm also requires additional code, which is more complicated to implement [19]. The SM4 algorithm is relatively simple to implement, the key scheduling and encryption algorithms are basically the same, and the same procedure can be used for decryption, as long as the order of the keys is reversed.…”
Section: Sm4 Algorithm and Performancementioning
confidence: 99%
“…In the twenty-four years since the first presentation by Kocher et al [1], SCA has experienced a renaissance of development. Novel strategies for power-based cryptanalysis have continued to develop over the years, with targets focusing on both symmetric encryption [1][2][3] and asymmetric encryption [4] algorithms. Through power usage, it has readily been demonstrated that valid attack vectors may be leveraged against properly instrumented low-power embedded systems running cryptographic algorithms.…”
Section: Introductionmentioning
confidence: 99%