2003
DOI: 10.1007/978-3-540-45126-6_12
|View full text |Cite
|
Sign up to set email alerts
|

Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
157
0
1

Year Published

2003
2003
2020
2020

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 264 publications
(164 citation statements)
references
References 20 publications
0
157
0
1
Order By: Relevance
“…A simple and straightforward attack on the AES cipher has been proposed by Bloemer et al in [41] and aims to change a single bit right after the first key addition. The objective is to reset a single bit in the internal state S (0) (in general, S (i) denotes the state at the beginning of the i-th round) and observe whether the value of the ciphertext has changed.…”
Section: B Attacks On Aesmentioning
confidence: 99%
“…A simple and straightforward attack on the AES cipher has been proposed by Bloemer et al in [41] and aims to change a single bit right after the first key addition. The objective is to reset a single bit in the internal state S (0) (in general, S (i) denotes the state at the beginning of the i-th round) and observe whether the value of the ciphertext has changed.…”
Section: B Attacks On Aesmentioning
confidence: 99%
“…Anderson and Kuhn used two different fault models for microcontroller based smartcards: in the first they assume that the instruction memory of smart cards can be randomly corrupted and in the second they assume that the attacker has the ability to write into specified locations in the memory. These and other fault attacks and associated fault models are summarized in [8,9]. The proposed CED approach is applicable to the practical fault models described.…”
Section: Fault-based Side Channels: the Fault Modelsmentioning
confidence: 99%
“…Fault analysis seeks to exploit the effect of a fault inserted into an instance of a cryptographic algorithm [8][9][10]. When implementing a block cipher a simple countermeasure is, as for side-channel analysis, to use time randomization, e.g.…”
Section: Introductionmentioning
confidence: 99%
“…From the resulting difference in the outputs, the secret key or parts of it are derived. In contrast to differential fault analysis, collision fault analysis [8] relies on finding a plaintext that maps to the same output as a faulty encryption of a different plaintext. This technique is often applied to attack early rounds of an algorithm.…”
Section: Introductionmentioning
confidence: 99%