2018
DOI: 10.1155/2018/2870475
|View full text |Cite
|
Sign up to set email alerts
|

Towards Optimized DFA Attacks on AES under Multibyte Random Fault Model

Abstract: Differential Fault Analysis (DFA) is one of the most practical methods to recover the secret keys from real cryptographic devices. In particular, DFA on Advanced Encryption Standard (AES) has been massively researched for many years for both single-byte and multibyte fault model. For AES, the first proposed DFA attack requires 6 pairs of ciphertexts to identify the secret key under multibyte fault model. Until now, the most efficient DFA under multibyte fault model proposed in 2017 can complete most of the att… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 18 publications
(34 reference statements)
0
1
0
Order By: Relevance
“…On the other hand, FA hacking technique is an active cryptanalysis based on perturbing the cryptographic device processing in order to obtain an abnormal behaviour. The hacker then exploits the erroneous of the cryptographic device result to retrieve the secret key [5], [6]. Many studies combine SCA and FA in order to form even more sophisticated attacks [7], [8].…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, FA hacking technique is an active cryptanalysis based on perturbing the cryptographic device processing in order to obtain an abnormal behaviour. The hacker then exploits the erroneous of the cryptographic device result to retrieve the secret key [5], [6]. Many studies combine SCA and FA in order to form even more sophisticated attacks [7], [8].…”
Section: Introductionmentioning
confidence: 99%