2011
DOI: 10.1007/978-3-642-27257-8_4
|View full text |Cite
|
Sign up to set email alerts
|

Differential Fault Analysis of AES-128 Key Schedule Using a Single Multi-byte Fault

Abstract: Abstract. In this paper we propose an improved multi-byte differential fault analysis of AES-128 key schedule using a single pair of fault-free and faulty ciphertexts. We propose a four byte fault model where the fault is induced at ninth round key. The induced fault corrupts all the four bytes of the first column of the ninth round key which subsequently propagates to the entire tenth round key. The elegance of the proposed attack is that it requires only a single faulty ciphertext and reduce the search space… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
33
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 15 publications
(37 citation statements)
references
References 17 publications
(37 reference statements)
0
33
0
Order By: Relevance
“…The same analysis also true for two diagonal and three diagonal attacks. The optimal attacks complexities are mentioned in Table 2, and it shows that the improvement in [1] indeed achieves the optimal complexities of the Diagonal attacks published in [24].…”
Section: Notementioning
confidence: 72%
See 4 more Smart Citations
“…The same analysis also true for two diagonal and three diagonal attacks. The optimal attacks complexities are mentioned in Table 2, and it shows that the improvement in [1] indeed achieves the optimal complexities of the Diagonal attacks published in [24].…”
Section: Notementioning
confidence: 72%
“…They do not use the inter-relationships of the faults at the output of the eighth round MixColumns and hence can be further optimized depending on the number of bytes corrupted in the diagonals. These optimized attacks are presented in [1], and their optimality can be argued in a similar fashion. According to our analysis, if the induced fault infects i bytes in the required state matrix, then the optimal attack result is given by K s · P (∆S), where ∆S is the required difference which can be of i bytes.…”
Section: Notementioning
confidence: 99%
See 3 more Smart Citations