Title
Optical Fault Attacks on AES: A Threat in Violet
Abstract
Microprocessors are the heart of the devices we rely on every day. However, their non-volatile memory, which often contains sensitive information, can be manipulated by ultraviolet (UV) irradiation. This paper gives practical results demonstrating that the non-volatile memory can be erased with UV light by investigating the effects of UV-Clight with a wavelength of 254 nm on four different depackaged microcontrollers. We demonstrate that an adversary can use this effect to attack an AES software implementation by manipulating the 256- bit S-box table. We show that if only a single byte of the table is changed, 2 500 pairs of correct and faulty encrypted inputs are sufficient to recover the key with a probability of 90%, in case the key schedule is not modified by the attack. Furthermore, we emphasize this by presenting a practical attack on an AES implementation running on an 8-bit microcontroller. Our attack involves only a standard decapsulation procedure and the use of alow-cost UV lamp.
Year
DOI
Venue
2009
10.1109/FDTC.2009.37
Fault Diagnosis and Tolerance in Cryptography
Keywords
DocType
ISBN
256-bit s-box table,aes implementation,alow-cost uv lamp,practical attack,practical result,non-volatile memory,uv light,aes software implementation,key schedule,8-bit microcontroller,optical fault attacks
Conference
978-1-4244-4972-9
Citations 
PageRank 
References 
17
1.20
12
Authors
3
Name
Order
Citations
PageRank
Jörn-Marc Schmidt130019.25
Michael Hutter234525.26
Thomas Plos323519.19